Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Ultimate User Guide for Managing Your Passwords [Part 2 of 5]

The Ultimate User Guide for Managing Your Passwords [Part 2 of 5]

In our last blog post, we covered the importance of having good security hygiene and why passwords need to be strong and unique. We also provided some tips for creating unique, strong passwords that are easier to remember. You’ll be using that method to create a couple of strong passwords, but ultimately, you’ll be using a password manager by the time you finish this 5-part guide.

In part two, we’re going to do some general housekeeping to make sure that all of your important online accounts are tied to a single email address, and we’re going to walk you through the steps to secure that email account.

What we are covering:

  1. Create a few strong master passwords
  2. Choose a primary email that governs your accounts
  3. Secure that email with a new, strong password
  4. Choose a Multi-Factor Authentication app
  5. Set up Multi-Factor Authentication on your primary email
  6. Select and set up a password manager
  7. Update every account, secure it, and log it in the password manager
  8. Delete old passwords stored in your browser
  9. Maintain the course and continue to practice good cybersecurity hygiene!

Step Two: Choose a Primary Email Address That Governs All of Your Accounts

Nearly all of your online accounts are tied to an email address. That way, if you forget your password, the account can send you an email to help you reset that password and get logged back in. If you have multiple email accounts, you’ll want all of your accounts under one roof just so you don’t have to play guessing games to hunt down the inbox that governs a particular account.

It’s fine to have multiple email accounts, in fact, most adults do. You might have an email account for work, one you received when enrolling in college, or one provided to you by your Internet service provider. You may also have Gmail, AOL, Yahoo, Hotmail, Outlook, or other types of email accounts.

We suggest that for most of your online accounts, you choose one single email account to manage everything (with the exception of work-related logins and accounts, those should always be through your work email). Everything that is personal to you, that you want to have access to and own the rights to indefinitely, should all be tied back to one single email inbox that you can trust to remain functional for the rest of your life. 

We recommend Google’s Gmail for this if you already have a Google account. We suggest avoiding using email accounts from your ISP, your place of work, or other organizations you are a part of. The goal is to establish an email that you are sure to keep for the rest of your life. We’d also suggest avoiding Yahoo accounts, as historically, Yahoo has had major issues involving every single email account being compromised.

We’ll use a Gmail account as our primary email for this example. 

This means that whenever I create an account somewhere, I always use the same email address. When I log into an older account and notice it’s tied to a different email, I adjust it. We will take a step to do this for all of your accounts shortly, so bear this in mind.

Step Three: Update Your Primary Email Password

Your primary email needs to be extremely secure. If a criminal were to gain access to your primary email, they’d be able to reset passwords for all your online accounts. Treat it like the crown jewels, and do everything you can to lock it down.

First, you need to update the password on your primary email. Generate a nice long password using the passphrase trick, and update the password. It should be at least 16 characters long, and use a combination of capital and lowercase letters, numbers, and symbols. It shouldn’t contain personally identifiable information like birthdays, years, family names, or anything else that might make it obvious that it’s your password. Don’t reuse a password; this password needs to be 100 percent unique.

For Gmail, you do this by going to your Google Account Settings, click Security, and go to Password.

For Outlook/Hotmail accounts, you can typically update your password here.

For Apple mail accounts, go to your Apple Account Settings. In the Sign-In and Security area, choose Password.

Be Sure to Check Out The Rest of the Posts in This Series

This is part two of a five-part guide! Head back to our blog to see the rest of these articles (we’ll post each one every other weekday). You can also click on #Password Guide below to see all the currently published parts.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Compliance Gadgets Cloud Computing Covid-19 Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Managed Services Data Security Vendor Apps Chrome Tip of the week Budget Voice over Internet Protocol Mobile Device Management Apple Gmail Networking App WiFi BYOD Employer-Employee Relationship Office 365 Access Control Hacker Avoiding Downtime Marketing Conferencing Managed IT Services How To BDR Computing HIPAA Information Technology Physical Security Applications Computers Health Analytics Office Tips 2FA Help Desk Augmented Reality Website Storage Password Retail Bring Your Own Device Healthcare Big Data Operating System Router Risk Management Virtual Private Network Printer Customer Service Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Managed IT Service Telephone Scam Firewall Data loss Cooperation Free Resource Project Management The Internet of Things Going Green Windows 7 Patch Management Save Money Microsoft 365 Social Remote Monitoring Vulnerability Cybercrime End of Support Vendor Management Solutions Display Computer Repair Mobile Security Processor Virtual Desktop Hacking LiFi Data storage Presentation Holidays Outlook Data Storage Wireless Technology Smart Technology Supply Chain Money Video Conferencing Humor Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Word Sports Mouse Maintenance Antivirus Downloads iPhone Administration Licensing Entertainment Vulnerabilities Data Privacy Safety Images 101 Telephone System Multi-Factor Authentication Settings Robot Mobility Wireless Printing Cost Management Content Filtering YouTube IT Management VPN Employees Cryptocurrency Meetings Customer Relationship Management Integration User Tip Modem Virtual Assistant Outsource IT Google Wallet Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Media Proxy Server Reviews Windows 8 Cookies Laptop Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Drones Tactics Development User Websites Mirgation Hypervisor Displays Shopping Nanotechnology Optimization Halloween PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint IP Address Addiction Management PCI DSS Chatbots Navigation Lenovo Gig Economy Hacks Screen Reader Scary Stories Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Fun Service Level Agreement Internet Service Provider Recovery Server Management Regulations Compliance Hard Drives Deep Learning Private Cloud Identity Evernote Paperless Superfish Bookmark Domains Identity Theft Smart Tech Memes Co-managed IT Education Twitter Alerts SQL Server Technology Care Download Net Neutrality Financial Data Refrigeration Error History Business Communications Browsers Smartwatch Public Speaking Mobile Computing Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Search Lithium-ion battery Upload Procurement Social Network Telework Best Practice Cyber security Entrepreneur Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Buisness Dark Web Cables IT solutions Alert Legal Trends Supply Chain Management Managed IT Customer Resource management FinTech Undo Business Growth File Sharing Regulations Dark Data Google Calendar Term Google Apps Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Cortana Gamification Flexibility Organization Alt Codes Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Downtime Ransmoware Application Hosted Solution Wearable Technology Memory Vendors Content Remote Working Health IT Typing Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Unified Threat Management Directions Videos IBM Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Knowledge Google Drive Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies 5G User Error Microchip Internet Exlporer Software as a Service Fraud Meta Unified Communications Managing Costs Amazon Experience Google Docs Username Competition Bitcoin Point of Sale eCommerce Running Cable Black Friday SSID

Blog Archive