Archives - Password Management


Set a passcode on every device that allows one

From iPhones to office paper shredders, any device that can accept a security PIN should have one set up. These passcodes protect your data against theft and interception, such as in a situation in which a device were lost or stolen.

Turn on autofill for passwords

Major web browsers and operating systems provide built-in tools for saving passwords. They can also autofill these logins for specific sites and applications. Make sure you’ve enabled the appropriate settings so that you don’t have to go hunting down a password each time you sign in to an account.

Create strong passwords

Use the strongest, longest password or passphrase permitted. Don’t use passwords that attackers can easily guess, like your birthday or your child’s name. Attackers can use software to conduct dictionary attacks, which try common words that may be used as passwords. They also conduct brute force attacks, which are random password attempts that run until […]

How to easily manage your passwords

Passwords are a pain. Not only do they need to be sufficiently complex to thwart a potential attacker’s brute-force guessing, they must also be memorable enough that you don’t end up having to request a reset each time you forget your login. The most common DIY solution to this problem is to simply recycle the […]

Go beyond six or eight characters in self-created passwords

Creating passwords is both an art and a science. It should be complex enough to thwart common guessing methodologies, but easy enough to remember. One way to strike a balance is to use an abbreviated phrase interspersed with a number and a special character, if applicable. That combination will give you a long yet memorable […]

Take advantage of options to limit exposure of private information

Default options on certain websites may be chosen for convenience, not for security. For example, avoid allowing a website to remember your password. If your password is stored, your profile and any account information you have provided on that site is readily available if an attacker gains access to your computer. Also, evaluate your settings […]