Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Ultimate User Guide for Managing Your Passwords [Part 2 of 5]

The Ultimate User Guide for Managing Your Passwords [Part 2 of 5]

In our last blog post, we covered the importance of having good security hygiene and why passwords need to be strong and unique. We also provided some tips for creating unique, strong passwords that are easier to remember. You’ll be using that method to create a couple of strong passwords, but ultimately, you’ll be using a password manager by the time you finish this 5-part guide.

In part two, we’re going to do some general housekeeping to make sure that all of your important online accounts are tied to a single email address, and we’re going to walk you through the steps to secure that email account.

What we are covering:

  1. Create a few strong master passwords
  2. Choose a primary email that governs your accounts
  3. Secure that email with a new, strong password
  4. Choose a Multi-Factor Authentication app
  5. Set up Multi-Factor Authentication on your primary email
  6. Select and set up a password manager
  7. Update every account, secure it, and log it in the password manager
  8. Delete old passwords stored in your browser
  9. Maintain the course and continue to practice good cybersecurity hygiene!

Step Two: Choose a Primary Email Address That Governs All of Your Accounts

Nearly all of your online accounts are tied to an email address. That way, if you forget your password, the account can send you an email to help you reset that password and get logged back in. If you have multiple email accounts, you’ll want all of your accounts under one roof just so you don’t have to play guessing games to hunt down the inbox that governs a particular account.

It’s fine to have multiple email accounts, in fact, most adults do. You might have an email account for work, one you received when enrolling in college, or one provided to you by your Internet service provider. You may also have Gmail, AOL, Yahoo, Hotmail, Outlook, or other types of email accounts.

We suggest that for most of your online accounts, you choose one single email account to manage everything (with the exception of work-related logins and accounts, those should always be through your work email). Everything that is personal to you, that you want to have access to and own the rights to indefinitely, should all be tied back to one single email inbox that you can trust to remain functional for the rest of your life. 

We recommend Google’s Gmail for this if you already have a Google account. We suggest avoiding using email accounts from your ISP, your place of work, or other organizations you are a part of. The goal is to establish an email that you are sure to keep for the rest of your life. We’d also suggest avoiding Yahoo accounts, as historically, Yahoo has had major issues involving every single email account being compromised.

We’ll use a Gmail account as our primary email for this example. 

This means that whenever I create an account somewhere, I always use the same email address. When I log into an older account and notice it’s tied to a different email, I adjust it. We will take a step to do this for all of your accounts shortly, so bear this in mind.

Step Three: Update Your Primary Email Password

Your primary email needs to be extremely secure. If a criminal were to gain access to your primary email, they’d be able to reset passwords for all your online accounts. Treat it like the crown jewels, and do everything you can to lock it down.

First, you need to update the password on your primary email. Generate a nice long password using the passphrase trick, and update the password. It should be at least 16 characters long, and use a combination of capital and lowercase letters, numbers, and symbols. It shouldn’t contain personally identifiable information like birthdays, years, family names, or anything else that might make it obvious that it’s your password. Don’t reuse a password; this password needs to be 100 percent unique.

For Gmail, you do this by going to your Google Account Settings, click Security, and go to Password.

For Outlook/Hotmail accounts, you can typically update your password here.

For Apple mail accounts, go to your Apple Account Settings. In the Sign-In and Security area, choose Password.

Be Sure to Check Out The Rest of the Posts in This Series

This is part two of a five-part guide! Head back to our blog to see the rest of these articles (we’ll post each one every other weekday). You can also click on #Password Guide below to see all the currently published parts.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Quick Tips Managed Service Saving Money Passwords Communication Cybersecurity Smartphone Data Backup Android AI Upgrade Data Recovery Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Information Holiday Artificial Intelligence Automation Gadgets Cloud Computing Covid-19 Training Managed Service Provider Compliance Remote Work Server Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Windows 10 Wi-Fi Virtualization Blockchain Bandwidth Business Technology Data Security Two-factor Authentication Vendor Apps Mobile Office Managed Services Voice over Internet Protocol Mobile Device Management App Gmail Networking WiFi BYOD Employer-Employee Relationship Chrome Budget Tip of the week Apple Conferencing How To BDR Computing Information Technology HIPAA Office 365 Applications Access Control Hacker Avoiding Downtime Marketing Retail Healthcare Managed IT Services Operating System Risk Management Big Data Router Analytics Office Tips Virtual Private Network Augmented Reality Computers Health Storage 2FA Help Desk Password Bring Your Own Device Website Remote Workers Telephone Scam Firewall Going Green Data loss Cooperation Free Resource Project Management Cybercrime The Internet of Things Windows 7 Patch Management Save Money Microsoft 365 Social Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Display Printer Customer Service Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Word Managed IT Service Maintenance Antivirus Downloads iPhone Licensing Settings Entertainment Wireless Vulnerabilities Printing Data Privacy Content Filtering Safety YouTube Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cryptocurrency Cost Management Virtual Desktop Data storage LiFi IT Management VPN Employees Meetings Customer Relationship Management Integration Outlook User Tip Modem Computer Repair Mobile Security Money Processor Hacking Humor Presentation Holidays Data Storage Sports Wireless Technology Smart Technology Supply Chain Mouse Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Administration Server Management Regulations Compliance Hard Drives Private Cloud Identity Evernote Paperless Best Practice Buisness Superfish Bookmark Domains Identity Theft Smart Tech Memes Co-managed IT Twitter Alerts SQL Server Technology Care Legal IT solutions Download Net Neutrality Financial Data Refrigeration Error History Business Communications Business Growth Browsers Smartwatch Public Speaking Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Cortana Lithium-ion battery Upload Procurement Social Network Telework Cyber security Entrepreneur Multi-Factor Security Tech Human Resources Alt Codes Downtime CES Tablet IoT Communitications Dark Web Cables Alert Hosted Solution Trends Supply Chain Management Managed IT Customer Resource management FinTech Undo File Sharing Regulations Dark Data Google Calendar Term Google Apps Typing Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Google Drive Knowledge Gamification Flexibility Organization Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras 5G Google Maps Smart Devices Ransmoware Application Wearable Technology Memory Vendors Google Docs Unified Communications Experience Content Remote Working Running Cable Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Bitcoin Google Wallet Unified Threat Management Directions Videos IBM Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Laptop Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Windows 8 Drones User Error Microchip Internet Exlporer Software as a Service Fraud Meta Username Managing Costs Amazon Halloween Competition Point of Sale eCommerce Black Friday SSID Virtual Assistant Outsource IT Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Media Scary Stories Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hacks Hotspot Transportation Small Businesses Fun Tactics Development User Websites Mirgation Hypervisor Displays Deep Learning Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing Education SharePoint IP Address Addiction Management PCI DSS Chatbots Navigation Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Mobile Computing Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Search Service Level Agreement Internet Service Provider Recovery

Blog Archive