Archives - Password Management


Use suggested passwords in Chrome

Secure tools like those built into Chrome and other web browsers can help you keep track of your login credentials without having to memorize passwords or write them down. Chrome can also suggest secure passwords. The next time you have to create a password, if you’re logged into your Google account in Chrome, click into […]

Use securely generated passwords from Firefox

If you use the latest version of Firefox, you have access to a handy feature from the built-in Lockwise password management app. Whenever you open a new account online, right-click on the appropriate field, select “Fill Password,” and then choose to use a securely generated code. Firefox will create a unique string of alphanumeric characters […]

Unique account, unique passphrase

Having separate passphrases/passwords for every account helps to thwart cybercriminals. At a minimum, separate your work and personal accounts and make sure that your critical accounts have the strongest passphrases.

How to protect your passwords

Now that you’ve chosen a password that’s easy for you to remember, but difficult for others to guess, you have to make sure not to leave it someplace for people to find. Writing it down and leaving it in your desk, next to your computer, or, worse, taped to your computer, is just making it […]

Establish end-of-life plans for your online accounts

Today, part of end-of-life planning entails managing a myriad of digital details. It’s very important to use a vaulted password manager and leave clear instructions for how to manage your social media and other accounts in the event of your passing. As always, we recommend using a password manager instead of writing passwords down.

Create a password for online video meetings

Video conferencing software is more popular than ever. That said, there are some security liabilities associated with its use, such as not enforcing password requirements for attendees. A password-less meeting could in theory let anyone join in, which could in turn let them listen to the discussion and steal sensitive information as well. Require a […]