Guiding CTOs Through Shadows: Exposing Password Vulnerabilities in Higher Education