Passwords

Weak passwords are one of the hacker’s most exploited doors. So what about controlling all aspects that are controllable?