What “crack time” actually means
When security teams talk about how long it takes to crack a password, they usually mean an offline attack: someone stole a database of password hashes, then tries billions of guesses per second on their own hardware. A website that locks you out after five wrong tries is much safer than that hash list, but once hashes leak, only mathematics and salt protect you.
The industry reference many awareness programs use is the Hive Systems Password Table, updated regularly with modern GPU cracking performance. It plots password length and character set against estimated time to exhaust or find a match. You can read their methodology and download the latest table from hivesystems.io/password-table. Hive encourages sharing the visual for training; credit them when you reuse it.
Our calculator below uses the same idea (keyspace divided by guess rate) with simplified numbers so you can explore scenarios. It is not a clone of Hive's table and does not use their proprietary benchmarks. For board-ready visuals, use their official asset.
Interactive crack-time estimator
Do not type real production passwords here. Adjust sliders to represent a policy or hypothetical password. All figures are illustrative.
Estimated average time to search half the space
Adjust sliders to calculate.
Rules that match what insurers and auditors expect
- Length beats complexity theater: A long random passphrase or a 15+ character secret from a password manager outlasts an 8-character “rules with symbols” password that humans reuse everywhere.
- Uniqueness: One breach should not give attackers every SaaS account. Managers make uniqueness realistic.
- Phishing resistance: Pair passwords with phishing-resistant MFA for executives and admins. Managers still matter for volume of secrets.
- Canadian context: Under PIPEDA and BC PIPA, weak access controls that lead to a breach become reportability and reputation problems, not only an IT ticket.
Keeper Security through Hexafusion
Keeper gives your team encrypted vaults, shared folders for IT and finance, dark-web monitoring add-ons, and enterprise controls: SSO, RBAC, audit logs, and enforced policies. Hexafusion is a technology partner and can license and deploy Keeper so onboarding, policy, and support stay with the same Vancouver team that manages your Microsoft 365 and devices. See our partners page and keepersecurity.com for product detail.
What you get when Hexafusion rolls out Keeper
- Standard vaults for every user plus secure shared records for break-glass and service accounts.
- Integration with Entra ID / Microsoft 365 and common SSO where you want single sign-on into the vault.
- Enforcement: minimum length, rotation where still required, and blocking known-bad or reused passwords where policy allows.
- Fewer helpdesk resets because staff are not juggling sticky notes or browser-only save prompts.
We recommend pairing deployment with short training: how to generate a record, how shared folders work, and why autofilling only on legitimate domains reduces phishing success.
What this means for your business
- Assume hashes will leak. Design passwords for offline attack cost, not only what login throttling allows.
- Prioritize length and uniqueness. Password managers are how teams do both without writing secrets on sticky notes.
- Use Hive Systems' published table for board or management visuals; use the estimator on this page to show how charset and length change the math.
- When you standardize on a business vault, Hexafusion can license and deploy Keeper with your managed services so procurement, policy, and helpdesk stay under one BC-based provider.
Roll out Keeper with your IT provider
We scope vault counts, migration from spreadsheets or legacy tools, and policy alignment with cyber insurance questionnaires. Start with a quote or a quick call.
Get a Quote Contact us