Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Ultimate User Guide for Managing Your Passwords [Part 2 of 5]

The Ultimate User Guide for Managing Your Passwords [Part 2 of 5]

In our last blog post, we covered the importance of having good security hygiene and why passwords need to be strong and unique. We also provided some tips for creating unique, strong passwords that are easier to remember. You’ll be using that method to create a couple of strong passwords, but ultimately, you’ll be using a password manager by the time you finish this 5-part guide.

In part two, we’re going to do some general housekeeping to make sure that all of your important online accounts are tied to a single email address, and we’re going to walk you through the steps to secure that email account.

What we are covering:

  1. Create a few strong master passwords
  2. Choose a primary email that governs your accounts
  3. Secure that email with a new, strong password
  4. Choose a Multi-Factor Authentication app
  5. Set up Multi-Factor Authentication on your primary email
  6. Select and set up a password manager
  7. Update every account, secure it, and log it in the password manager
  8. Delete old passwords stored in your browser
  9. Maintain the course and continue to practice good cybersecurity hygiene!

Step Two: Choose a Primary Email Address That Governs All of Your Accounts

Nearly all of your online accounts are tied to an email address. That way, if you forget your password, the account can send you an email to help you reset that password and get logged back in. If you have multiple email accounts, you’ll want all of your accounts under one roof just so you don’t have to play guessing games to hunt down the inbox that governs a particular account.

It’s fine to have multiple email accounts, in fact, most adults do. You might have an email account for work, one you received when enrolling in college, or one provided to you by your Internet service provider. You may also have Gmail, AOL, Yahoo, Hotmail, Outlook, or other types of email accounts.

We suggest that for most of your online accounts, you choose one single email account to manage everything (with the exception of work-related logins and accounts, those should always be through your work email). Everything that is personal to you, that you want to have access to and own the rights to indefinitely, should all be tied back to one single email inbox that you can trust to remain functional for the rest of your life. 

We recommend Google’s Gmail for this if you already have a Google account. We suggest avoiding using email accounts from your ISP, your place of work, or other organizations you are a part of. The goal is to establish an email that you are sure to keep for the rest of your life. We’d also suggest avoiding Yahoo accounts, as historically, Yahoo has had major issues involving every single email account being compromised.

We’ll use a Gmail account as our primary email for this example. 

This means that whenever I create an account somewhere, I always use the same email address. When I log into an older account and notice it’s tied to a different email, I adjust it. We will take a step to do this for all of your accounts shortly, so bear this in mind.

Step Three: Update Your Primary Email Password

Your primary email needs to be extremely secure. If a criminal were to gain access to your primary email, they’d be able to reset passwords for all your online accounts. Treat it like the crown jewels, and do everything you can to lock it down.

First, you need to update the password on your primary email. Generate a nice long password using the passphrase trick, and update the password. It should be at least 16 characters long, and use a combination of capital and lowercase letters, numbers, and symbols. It shouldn’t contain personally identifiable information like birthdays, years, family names, or anything else that might make it obvious that it’s your password. Don’t reuse a password; this password needs to be 100 percent unique.

For Gmail, you do this by going to your Google Account Settings, click Security, and go to Password.

For Outlook/Hotmail accounts, you can typically update your password here.

For Apple mail accounts, go to your Apple Account Settings. In the Sign-In and Security area, choose Password.

Be Sure to Check Out The Rest of the Posts in This Series

This is part two of a five-part guide! Head back to our blog to see the rest of these articles (we’ll post each one every other weekday). You can also click on #Password Guide below to see all the currently published parts.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Ransomware Workplace Strategy Mobile Device Microsoft Small Business Quick Tips Passwords Cybersecurity Backup Saving Money Communication Data Backup Smartphone Managed Service Android Business Management Smartphones VoIP Productivity Upgrade Mobile Devices communications Disaster Recovery Data Recovery Browser Social Media Windows Managed IT Services Microsoft Office AI Current Events Network Tech Term Remote Internet of Things Facebook Artificial Intelligence Automation Miscellaneous Gadgets Cloud Computing Holiday Information Covid-19 Server Managed Service Provider Training Remote Work Outsourced IT Spam Compliance Encryption Employee/Employer Relationship Office Windows 10 IT Support Business Continuity Government Data Management Virtualization Bandwidth Blockchain Wi-Fi Windows 10 Business Technology Apps Data Security Mobile Office Vendor Two-factor Authentication Tip of the week Chrome Budget Managed Services Voice over Internet Protocol Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Gmail WiFi Conferencing How To BDR Hacker Avoiding Downtime Computing Marketing Information Technology HIPAA Applications Access Control Office 365 Analytics Office Tips Augmented Reality 2FA Help Desk Retail Big Data Storage Password Bring Your Own Device Managed IT Services Healthcare Computers Operating System Website Virtual Private Network Risk Management Router Health Windows 11 The Internet of Things Monitoring Document Management Excel Social Scam Remote Workers Data loss Telephone Customer Service Going Green Patch Management Cooperation Free Resource Project Management Save Money Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management Cybercrime Microsoft 365 Physical Security Solutions Display Printer Paperless Office Firewall Infrastructure Holidays Outlook Safety Machine Learning Money Data Storage Smart Technology Supply Chain Humor Video Conferencing Managed Services Provider Saving Time Maintenance Virtual Machines Professional Services Antivirus Sports Mouse Managed IT Service Downloads Customer Relationship Management Administration iPhone Licensing Entertainment Hacking Vulnerabilities Presentation Data Privacy Robot Images 101 Settings Printing Wireless Technology Wireless Multi-Factor Authentication Content Filtering Mobility Telephone System IT Management Cost Management VPN YouTube Meetings Cryptocurrency Word Computer Repair Employees Integration Virtual Desktop LiFi Modem Data storage User Tip Processor Mobile Security Proxy Server Reviews Cookies Electronic Medical Records Cyber Monday Medical IT SharePoint Undo Tactics Development Halloween Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Writing Lenovo Shopping Nanotechnology Optimization Virtual Reality PowerPoint Hacks Server Management Addiction Scary Stories Private Cloud Language Employer/Employee Relationships Outsourcing Chatbots Fun Navigation Superfish Management PCI DSS Identity Theft Gig Economy Deep Learning Application Screen Reader Twitter Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Error Computing Infrastructure Teamwork Hiring/Firing Identity Social Engineering Evernote Paperless IBM Regulations Compliance Education Bookmark Smart Tech Memes Remote Computing Co-managed IT Mobile Computing Download Net Neutrality Alerts SQL Server Technology Care History Search Business Communications Financial Data Tablet Browsers Smartwatch Best Practice Connectivity IT Alert Break Fix Scams Managed IT Competition Upload Procurement Buisness File Sharing Azure Hybrid Work Dark Data Cyber security How To Multi-Factor Security Tech Human Resources Legal Social Network Telework IT solutions CES Business Growth IoT Communitications Notifications Dark Web Cables Trends Supply Chain Management Travel User Regulations Cortana Google Calendar Term Google Apps Techology Customer Resource management FinTech Google Maps Data Analysis Alt Codes Star Wars IT Assessment Microsoft Excel IT Maintenance Gamification Flexibility Downtime Unified Threat Management Staff Value Business Intelligence Social Networking Legislation Shortcuts Unified Threat Management IP Address Organization Hosted Solution Fileless Malware Digital Security Cameras Typing Smart Devices Ransmoware Content Remote Working Wearable Technology Memory Vendors Network Congestion Recovery Motherboard Data Breach Knowledge Comparison Google Play Be Proactive Google Drive User Error Health IT Directions Videos Hard Drives Assessment Electronic Health Records Permissions Workforce Domains Point of Sale Wasting Time Threats 5G Trend Micro Experience Specifications Security Cameras Workplace Strategies Google Docs Unified Communications Microchip Bitcoin Network Management Refrigeration Internet Exlporer Software as a Service Running Cable Tech Support Fraud Meta Google Wallet Public Speaking Username Managing Costs Amazon Monitors eCommerce Black Friday SSID Lithium-ion battery Windows 8 Database Surveillance Laptop Websites Entrepreneur Virtual Assistant Outsource IT Media Drones IT Technicians Virtual Machine Environment

Blog Archive