Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Ultimate User Guide for Managing Your Passwords [Part 2 of 5]

The Ultimate User Guide for Managing Your Passwords [Part 2 of 5]

In our last blog post, we covered the importance of having good security hygiene and why passwords need to be strong and unique. We also provided some tips for creating unique, strong passwords that are easier to remember. You’ll be using that method to create a couple of strong passwords, but ultimately, you’ll be using a password manager by the time you finish this 5-part guide.

In part two, we’re going to do some general housekeeping to make sure that all of your important online accounts are tied to a single email address, and we’re going to walk you through the steps to secure that email account.

What we are covering:

  1. Create a few strong master passwords
  2. Choose a primary email that governs your accounts
  3. Secure that email with a new, strong password
  4. Choose a Multi-Factor Authentication app
  5. Set up Multi-Factor Authentication on your primary email
  6. Select and set up a password manager
  7. Update every account, secure it, and log it in the password manager
  8. Delete old passwords stored in your browser
  9. Maintain the course and continue to practice good cybersecurity hygiene!

Step Two: Choose a Primary Email Address That Governs All of Your Accounts

Nearly all of your online accounts are tied to an email address. That way, if you forget your password, the account can send you an email to help you reset that password and get logged back in. If you have multiple email accounts, you’ll want all of your accounts under one roof just so you don’t have to play guessing games to hunt down the inbox that governs a particular account.

It’s fine to have multiple email accounts, in fact, most adults do. You might have an email account for work, one you received when enrolling in college, or one provided to you by your Internet service provider. You may also have Gmail, AOL, Yahoo, Hotmail, Outlook, or other types of email accounts.

We suggest that for most of your online accounts, you choose one single email account to manage everything (with the exception of work-related logins and accounts, those should always be through your work email). Everything that is personal to you, that you want to have access to and own the rights to indefinitely, should all be tied back to one single email inbox that you can trust to remain functional for the rest of your life. 

We recommend Google’s Gmail for this if you already have a Google account. We suggest avoiding using email accounts from your ISP, your place of work, or other organizations you are a part of. The goal is to establish an email that you are sure to keep for the rest of your life. We’d also suggest avoiding Yahoo accounts, as historically, Yahoo has had major issues involving every single email account being compromised.

We’ll use a Gmail account as our primary email for this example. 

This means that whenever I create an account somewhere, I always use the same email address. When I log into an older account and notice it’s tied to a different email, I adjust it. We will take a step to do this for all of your accounts shortly, so bear this in mind.

Step Three: Update Your Primary Email Password

Your primary email needs to be extremely secure. If a criminal were to gain access to your primary email, they’d be able to reset passwords for all your online accounts. Treat it like the crown jewels, and do everything you can to lock it down.

First, you need to update the password on your primary email. Generate a nice long password using the passphrase trick, and update the password. It should be at least 16 characters long, and use a combination of capital and lowercase letters, numbers, and symbols. It shouldn’t contain personally identifiable information like birthdays, years, family names, or anything else that might make it obvious that it’s your password. Don’t reuse a password; this password needs to be 100 percent unique.

For Gmail, you do this by going to your Google Account Settings, click Security, and go to Password.

For Outlook/Hotmail accounts, you can typically update your password here.

For Apple mail accounts, go to your Apple Account Settings. In the Sign-In and Security area, choose Password.

Be Sure to Check Out The Rest of the Posts in This Series

This is part two of a five-part guide! Head back to our blog to see the rest of these articles (we’ll post each one every other weekday). You can also click on #Password Guide below to see all the currently published parts.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Phishing Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Ransomware Users AI Managed Service Mobile Device Productivity Saving Money Microsoft Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Artificial Intelligence Facebook Holiday Automation Compliance Gadgets Cloud Computing Covid-19 Training Managed Service Provider Outsourced IT Remote Work Server IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Vendor Business Technology Managed Services Data Security Apps Two-factor Authentication Mobile Office Chrome Tip of the week Mobile Device Management Budget Voice over Internet Protocol Gmail Apple WiFi Networking App Employer-Employee Relationship BYOD Conferencing Password Managed IT Services How To BDR Computing HIPAA Physical Security Information Technology Applications Hacker Avoiding Downtime Access Control Office 365 Marketing Augmented Reality Storage Retail Healthcare Bring Your Own Device Big Data Operating System Router Risk Management Computers Virtual Private Network Health 2FA Analytics Website Office Tips Help Desk Excel Document Management Firewall Managed IT Service Remote Workers Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Social Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Cybercrime Vendor Management Solutions Customer Service Display Printer Paperless Office Windows 11 Infrastructure Monitoring Video Conferencing Money Humor Word Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Sports Maintenance Mouse Downloads Antivirus iPhone Safety Administration Licensing Vulnerabilities Entertainment Data Privacy Images 101 Robot Mobility Telephone System Settings Multi-Factor Authentication Cost Management Wireless Printing Content Filtering Customer Relationship Management YouTube IT Management Cryptocurrency VPN Employees Meetings Hacking Integration Presentation Modem User Tip Processor Virtual Desktop Computer Repair Mobile Security Data storage LiFi Wireless Technology Holidays Outlook Data Storage Smart Technology Supply Chain SharePoint Hard Drives Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Domains Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Workplace Hacks Lenovo Gig Economy Scary Stories Refrigeration Service Level Agreement Internet Service Provider Fun Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Deep Learning Public Speaking Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Lithium-ion battery Superfish Bookmark Education Download Net Neutrality Entrepreneur Twitter Alerts SQL Server Technology Care Business Communications Financial Data Error History Connectivity IT Social Engineering Break Fix Scams Mobile Computing Browsers Smartwatch Undo Upload Procurement Search Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Best Practice Social Network Telework Cyber security Buisness Tablet IoT Communitications Dark Web Cables CES Legal IT solutions Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Business Growth Managed IT Customer Resource management FinTech File Sharing Regulations Application Star Wars IT Assessment How To Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Cortana Notifications Staff Value Business Intelligence Legislation Shortcuts Alt Codes IBM Organization Travel Social Networking Downtime Google Maps Smart Devices Ransmoware Techology Fileless Malware Digital Security Cameras Hosted Solution Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Typing Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Google Drive Competition Knowledge Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro User Error Microchip Internet Exlporer Software as a Service 5G Fraud Meta Google Docs Unified Communications Username Experience Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Bitcoin Running Cable User Database Surveillance Virtual Assistant Outsource IT Google Wallet Media Network Management Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Windows 8 IP Address Proxy Server Reviews Laptop Tactics Development Hotspot Transportation Small Businesses Drones Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Shopping Halloween Recovery

Blog Archive