How a password manager can help secure your passwords
Authored by a Symantec employee
Let’s say you have 25 different online accounts. That means you should have 25 unique — and complex — passwords to manage. And since you know better than to write them down on sticky notes or in a notebook, what are you supposed to do?
A password manager may be just the solution. But what are they, how do they work, and how secure are they? Let’s try to answer some of those questions.
What is a password manager?
A password manager is a program that houses all your passwords, as well as other information, in one convenient location with one master password. The benefits to using a password manager are:
- A password manager will do the work of creating the complicated passwords you need to help protect your online accounts.
- You need to remember only the password manager’s password. That single password will give you access to all of your others.
- Many password managers offer the extra layer of protection of two-factor authentication. As a result, each time you attempt to log in to your password manager, a unique, one-time verification code is sent to your mobile phone. To complete the log-in process, you must enter the verification code, in addition to your username and password.
Are password managers secure?
Since some password managers are heavily encrypted, it can be a smarter alternative to store your passwords in a password manager than it is to store them in a file on your computer. In the event of a malware attack, the documents on your computer could be encrypted or stolen.
Despite attacks on password managers in recent years, the security benefits of storing your passwords in an encrypted environment can outweigh some of the risks of keeping passwords on your computer or written down in a notebook.
How do password managers generate strong passwords?
Not only do password managers help securely house your passwords, but they can also generate passwords that are unique and complex, which makes them more difficult to crack or guess. To do this, password managers use encryption algorithms.
These algorithms can be difficult to understand. What’s most important to know is that you should use a different generated password for each login to keep your information out of the hands of hackers. Every algorithm-generated password includes a combination of upper and lowercase letters, symbols, and numbers, which are unpredictable.
When you generate a new password through a password manager, you’ll have the option to make it as lengthy and diverse as you like, without the need to remember it yourself. You need to select the criteria that are required of your password, typically provided by the site that you’re logging into, which could include password length among other requirements.
We generated five passwords with the same criteria with Norton Identity Safe, which resulted in extremely diverse sets of numbersand symbols:
As you can see, password generators can help you create passwords that are unique, complex, and difficult to guess, making your logins as secure as possible.
Not only will a password manager provide a strong password, but it can also simplify your life by making account access easier for you and more difficult for hackers. If you’re considering a password manager to help protect your personal information, consider Norton Identity Safe. It’s a free password manager that makes logging into your favorite sites easier and more secure.
Device security, Dark Web Monitoring powered by LifeLock and a VPN–up to 65% off*
NEW Norton 360 has multiple layers of protection including a VPN for online privacy.
Editorial note: Our articles provide educational information for you. Norton LifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.
Copyright © 2019 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.
No one can prevent all identity theft or cybercrime. Not all products, services and features are available on all devices or operating systems. System requirement information on norton.com.
*Important Subscription, Pricing and Offer Details:
- The price quoted today may include an introductory offer. After that, your membership will automatically renew and be billed at the applicable monthly or annual renewal price found here.
- You can cancel your subscription at my.norton.com or by contacting Member Services & Support. For more details, please visit the Refund Policy.
- Your subscription may include product, service and /or protection updates and features may be added, modified or removed subject to the acceptance of the Customer Agreement.
The number of supported devices allowed under your plan are primarily for personal or household use only. Not for commercial use. If you have issues adding a device, please contact Member Services & Support.
§ Dark Web Monitoring in Norton 360 plans defaults to monitor your email address only. Please login to the portal to review if you can add additional information for monitoring purposes.