How to Use a Password Manager

how to use a password manager

We all know the struggles of staring at the computer screen trying to remember the password to a login. Thankfully, password managers exist to save the day, and your sanity.

What Are Password Managers?

Password managers store your login information for all the websites you use and even let you automatically login to them. Along with storing your passwords, a password manager generates secure, random, passwords for you and remembers them so you don’t have to.

Setup and Function:

  1. The first thing you’ll need to do with a password manager is create yourmaster password. This master password (the only one you have to remember) controls access to your entire password manager database  so you should make it particularly strong. You can change this password later, but only if you remember it – if you lose your master password, you won’t be able to view your various saved passwords. 
  2. Visit a website and register a username of your choice but then login to your password manager and instead of racking your brain to think of a new password, the manager will create one for you! The login information will be safely secured in the password manager database. 
  3. The next time you visit that website, just login to your password manager and it will autofill your login information into the username and password fields.*

*If you’re already logged into your password manager, it will automatically fill the data for you. 

Password Managers Can Also:

  • Be configured to automatically fill information like your address, name, and email address into web forms.
  • Allow you to store other types of data in a secure form – everything from credit card numbers to secure notes. All data you store in a password manager is encrypted with your master password.
  • Help against phishing, as they fill account information into websites based on their web address (URL).

Create your own custom policy set with Securicy Policy Builder!

This blog is meant to provide a starting point to implementing cyber security practices within your company. Due to the rapid progression of technology this is an ongoing and ever-evolving subject!