Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Ultimate User Guide for Managing Your Passwords [Part 2 of 5]

The Ultimate User Guide for Managing Your Passwords [Part 2 of 5]

In our last blog post, we covered the importance of having good security hygiene and why passwords need to be strong and unique. We also provided some tips for creating unique, strong passwords that are easier to remember. You’ll be using that method to create a couple of strong passwords, but ultimately, you’ll be using a password manager by the time you finish this 5-part guide.

In part two, we’re going to do some general housekeeping to make sure that all of your important online accounts are tied to a single email address, and we’re going to walk you through the steps to secure that email account.

What we are covering:

  1. Create a few strong master passwords
  2. Choose a primary email that governs your accounts
  3. Secure that email with a new, strong password
  4. Choose a Multi-Factor Authentication app
  5. Set up Multi-Factor Authentication on your primary email
  6. Select and set up a password manager
  7. Update every account, secure it, and log it in the password manager
  8. Delete old passwords stored in your browser
  9. Maintain the course and continue to practice good cybersecurity hygiene!

Step Two: Choose a Primary Email Address That Governs All of Your Accounts

Nearly all of your online accounts are tied to an email address. That way, if you forget your password, the account can send you an email to help you reset that password and get logged back in. If you have multiple email accounts, you’ll want all of your accounts under one roof just so you don’t have to play guessing games to hunt down the inbox that governs a particular account.

It’s fine to have multiple email accounts, in fact, most adults do. You might have an email account for work, one you received when enrolling in college, or one provided to you by your Internet service provider. You may also have Gmail, AOL, Yahoo, Hotmail, Outlook, or other types of email accounts.

We suggest that for most of your online accounts, you choose one single email account to manage everything (with the exception of work-related logins and accounts, those should always be through your work email). Everything that is personal to you, that you want to have access to and own the rights to indefinitely, should all be tied back to one single email inbox that you can trust to remain functional for the rest of your life. 

We recommend Google’s Gmail for this if you already have a Google account. We suggest avoiding using email accounts from your ISP, your place of work, or other organizations you are a part of. The goal is to establish an email that you are sure to keep for the rest of your life. We’d also suggest avoiding Yahoo accounts, as historically, Yahoo has had major issues involving every single email account being compromised.

We’ll use a Gmail account as our primary email for this example. 

This means that whenever I create an account somewhere, I always use the same email address. When I log into an older account and notice it’s tied to a different email, I adjust it. We will take a step to do this for all of your accounts shortly, so bear this in mind.

Step Three: Update Your Primary Email Password

Your primary email needs to be extremely secure. If a criminal were to gain access to your primary email, they’d be able to reset passwords for all your online accounts. Treat it like the crown jewels, and do everything you can to lock it down.

First, you need to update the password on your primary email. Generate a nice long password using the passphrase trick, and update the password. It should be at least 16 characters long, and use a combination of capital and lowercase letters, numbers, and symbols. It shouldn’t contain personally identifiable information like birthdays, years, family names, or anything else that might make it obvious that it’s your password. Don’t reuse a password; this password needs to be 100 percent unique.

For Gmail, you do this by going to your Google Account Settings, click Security, and go to Password.

For Outlook/Hotmail accounts, you can typically update your password here.

For Apple mail accounts, go to your Apple Account Settings. In the Sign-In and Security area, choose Password.

Be Sure to Check Out The Rest of the Posts in This Series

This is part two of a five-part guide! Head back to our blog to see the rest of these articles (we’ll post each one every other weekday). You can also click on #Password Guide below to see all the currently published parts.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Communication Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade Data Recovery VoIP Business Management Smartphones AI Disaster Recovery Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Tech Term Network Internet of Things Remote Facebook Miscellaneous Information Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Data Management Government Business Continuity Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Gmail Apple Networking App Employer-Employee Relationship BYOD Chrome Tip of the week Mobile Device Management Budget Managed Services Voice over Internet Protocol WiFi How To BDR Computing HIPAA Information Technology Applications Hacker Avoiding Downtime Office 365 Access Control Marketing Conferencing Bring Your Own Device Healthcare Managed IT Services Big Data Operating System Router Risk Management Computers Virtual Private Network Health Analytics Website Office Tips 2FA Help Desk Augmented Reality Storage Password Retail Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability Cybercrime End of Support Vendor Management Solutions Customer Service Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Firewall Remote Workers Maintenance Mouse Antivirus Downloads iPhone Safety Administration Licensing Vulnerabilities Entertainment Data Privacy Images 101 Telephone System Multi-Factor Authentication Settings Robot Mobility Wireless Printing Cost Management Content Filtering Customer Relationship Management YouTube IT Management VPN Employees Cryptocurrency Meetings Hacking Integration Presentation User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Data storage LiFi Wireless Technology Holidays Outlook Data Storage Smart Technology Supply Chain Money Video Conferencing Humor Machine Learning Managed Services Provider Word Saving Time Virtual Machines Professional Services Sports Managed IT Service Download Net Neutrality Education Twitter Alerts SQL Server Technology Care Entrepreneur Financial Data Error History Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Mobile Computing Connectivity IT Upload Procurement Undo Remote Computing Azure Hybrid Work Search Social Network Telework Best Practice Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Tablet IoT Communitications Buisness Trends Supply Chain Management IT solutions Alert Legal Managed IT Customer Resource management FinTech Business Growth File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Application Gamification Flexibility Notifications Staff Value Business Intelligence Cortana Organization Alt Codes IBM Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Downtime Content Remote Working Hosted Solution Wearable Technology Memory Vendors Health IT Typing Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Assessment Electronic Health Records Competition Wasting Time Threats Knowledge Google Drive Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta 5G User Error Microchip Internet Exlporer Software as a Service Username Unified Communications Managing Costs Amazon Experience Google Docs Bitcoin Point of Sale eCommerce Running Cable User Black Friday SSID Virtual Assistant Outsource IT Google Wallet Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Media Proxy Server Reviews Windows 8 IP Address Cookies Laptop Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Drones Tactics Development Websites Mirgation Hypervisor Displays Shopping Nanotechnology Optimization Halloween Recovery PowerPoint Hard Drives Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Management PCI DSS Domains Chatbots Navigation Lenovo Gig Economy Hacks Screen Reader Scary Stories Writing Distributed Denial of Service Workplace Refrigeration Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Fun Service Level Agreement Internet Service Provider Server Management Regulations Compliance Deep Learning Public Speaking Private Cloud Identity Evernote Paperless Superfish Bookmark Lithium-ion battery Identity Theft Smart Tech Memes Co-managed IT

Blog Archive