Account Compromise Risk Calculator

Measure how likely your account gets compromised. Tune advanced factors for accuracy. Export results for audits and continuous improvement reports.

Assessment inputs

Use realistic settings for one account identity.

Tip: 12–16+ characters reduces guessing risk.
Reuse enables credential-stuffing attacks.
Stronger MFA reduces account takeover probability.
Exposure increases targeted and automated attacks.
Phishing drives credential theft and session hijack.
Public identifiers increase phishing and guessing attempts.
Unpatched devices raise malware and token theft risk.
Endpoint protection reduces keylogger impact.
Reduces opportunistic access on shared devices.
Alerts shorten attacker dwell time.
Weak recovery enables account reset attacks.
Higher impact requires stricter controls.
This tool estimates risk, not certainty. Use it for prioritization.

Example dataset

Sample rows show how control changes can shift risk scores.

Profile Password MFA Breach Device hygiene Monitoring Typical score Risk level
Hardened 16+, unique App/key None Patched + protected Alerts on 15–28 Low
Everyday 12, some reuse SMS Unknown Mixed controls Alerts on 35–55 Moderate
Exposed 8–10, reused None Medium Unpatched No alerts 70–90 High/Critical

Formula used

Each factor produces a sub-score from 0 to 100 where higher means higher risk. The final score is a weighted average, normalized by total weight.

RiskScore = Σ( Weighti / ΣWeight ) × SubRiski
  • SubRisk values are derived from practical controls (MFA, reuse, hygiene).
  • Weights can be adjusted to match your threat model and asset criticality.
  • Levels: Low < 25, Moderate 25–49.9, High 50–74.9, Critical ≥ 75.

How to use this calculator

  1. Enter realistic settings for one account and its device context.
  2. Enable “advanced options” only if you need custom weighting.
  3. Press Calculate risk to view score, level, and priorities.
  4. Export CSV or PDF for audits, tickets, or security reviews.
  5. Re-run after improvements to track risk reduction over time.

Security signal coverage and scoring

This calculator treats account compromise as a blend of credential, user, and device risks. Each factor is converted into a sub-risk from 0 to 100, then combined using normalized weights. A score near 0 suggests strong controls with low exposure. A score near 100 indicates weak controls and high attack surface.

Password quality and credential reuse

Password strength is modeled through length and reuse patterns. Short passwords increase guessing feasibility, while reuse amplifies credential-stuffing success when any site is breached. In many incident reviews, reuse is the fastest path from one compromise to many accounts. Target 12–16+ characters and unique secrets.

Multi-factor authentication impact

MFA strength shifts risk substantially because it disrupts password-only takeover. App- or key-based MFA is scored as lower risk than SMS due to common SIM-swap and interception threats. If you are protecting privileged roles, prioritize phishing-resistant MFA and require step-up verification for sensitive actions.

Breach exposure and phishing susceptibility

Breach exposure reflects how often attackers can test known credentials or personal identifiers. Phishing susceptibility captures the likelihood of handing over credentials or approving push prompts. If either signal is “high,” remediation should include password rotation, improved awareness, and safer sign-in flows such as device-bound sessions.

Device hygiene, monitoring, and recovery paths

Unpatched endpoints and weak malware defenses enable keylogging, cookie theft, and session hijacking. Monitoring reduces time-to-detect by surfacing unusual sign-ins quickly. Recovery security matters because attackers often reset access via email or phone. Use recovery codes, protect mailbox MFA, and review recovery contacts quarterly.

Using results for audits and continuous improvement

Export the breakdown to compare teams, roles, or account types. For example, privileged accounts should typically score below 30 with strong MFA and hardened endpoints. Track changes monthly: raising MFA strength, removing reuse, and enabling alerts often yields the fastest score reduction. Treat “Critical” as immediate action, and “High” as prioritized backlog work.

FAQs

1) Is the score a probability of compromise?

No. It is a normalized risk index for prioritization. Use it to compare accounts, track improvements, and decide where controls will reduce exposure fastest.

2) Why does password reuse increase risk so much?

Reuse enables automated credential stuffing. If one service leaks your password, attackers can rapidly test it elsewhere, often succeeding without targeting you personally.

3) Which MFA option should I choose?

Prefer authenticator apps or hardware keys. SMS is better than none, but it can be bypassed through SIM-swap or phone-number attacks in many regions.

4) What does “breach exposure: unknown” mean here?

It represents uncertainty in credential history. If you cannot confirm exposure, assume moderate risk and reduce it by rotating passwords and enabling strong MFA.

5) How should organizations tune weights?

Increase weights for the attack paths you observe most. For phishing-heavy environments, raise phishing and MFA weights. For device-heavy compromise, raise device hygiene and monitoring.

6) What is a good target score for privileged accounts?

Aim for below 30 by using strong MFA, unique long passwords, secured recovery, patched endpoints, and always-on alerts. Lower targets may be appropriate for critical systems.

Related Calculators

Insider Risk ScoreEmployee Threat ScoreUser Risk RatingBehavior Anomaly ScoreCredential Misuse RiskMalicious Insider RiskNegligent Insider RiskAccess Abuse RiskEndpoint Insider RiskFile Access Risk

Important Note: All the Calculators listed in this site are for educational purpose only and we do not guarentee the accuracy of results. Please do consult with other sources as well.