Tech Tip: How to use a Password Manager • Blisstech Solutions

This Tech Tip is a tip on how to manage your passwords. It’s a long tip this week, but that’s because there is a lot to tell!

With so many things being done online now, passwords are needed constantly.  But with the advice that every password should be unique and not to keep them written down or in a spreadsheet, it can seem impossible to follow this advice. However, it is possible, and this tip will show you how.

I have over 800 passwords for various things, and most of them look like this:

p0PX%pNOw^7*$ce05eWz

But I don’t need to remember any of them. How? I use a password manager.

A password manager helps you to generate passwords and stores them securely, automatically filling them in for you so you do not need to remember what your passwords are. You just need to remember one password; the password that logs you into your password manager!

Well, this week’s tip will show you:
👉 What a password manager is and how it works.
👉 How to use a password manager to generate and store your passwords.
👉 How you can use password managers across your business and report on bad password practices.

Today’s tip will help you to:
💥 Drastically improve your password hygiene.
💥 Stop having to remember SO MANY passwords.
💥 Improve the security of your business by encouraging good practices.

We hope you enjoy it. To learn more you can subscribe to our YouTube channel. The link is in the first comment.

Thanks for watching.

More Content

Are your employees your security’s weakest link?

Are your employees your security’s weakest link?

Great employees have the same goals you do. But while they’re working hard to help your business succeed, they could accidentally be opening the door to cyber criminals. Here’s how to make your team your business’s strongest defence…

What to do when disaster strikes: Creating an Incident Response Plan

Your business has firewalls, the latest security software, multi-factor authentication, and, of course, uncrackable passwords. You may even have Cyber Essentials—high five. But… It’s still not enough to protect you from 100% of cyber attacks. Completely watertight...
Blisstech - Top M365 Tools - Blog image

Unlock the Hidden Productivity Gems within Microsoft 365

Microsoft 365 is a cornerstone for many businesses, but its vast potential often remains untapped. While applications like Word, Excel, PowerPoint, and Teams are widely used, there's a treasure trove of productivity-enhancing tools waiting to be discovered. Embark on...
Cyber security training once a year isn’t working

Cyber security training once a year isn’t working

You’re wasting your time on annual cyber security training. Why? Because it’s simply not cutting it anymore. Discover a better plan here.

How To Secure Your Business When Remote Working

The global COVID-19 crisis means that more people are remote working than ever before.  Businesses rushed to enable their employees to work from anywhere very quickly, which may include access to sensitive company data.  In the rush to stay operational during the...
1 in 4 people struggle with password overload. Here’s the answer

1 in 4 people struggle with password managment. Here’s the answer

Struggling from password overload? You’re not alone, and it’s putting your business at risk of data theft. Good news: There’s a very simple solution and we’ll tell you all about it.

BEC attacks illustrated. Image of a hacker standing behind a computer looking menacing

Business Email Compromise (BEC) attacks are rising

Business Email Compromise (BEC) has emerged as a significant threat to businesses worldwide in recent years. As of March 2025, there has been a staggering 30% increase in BEC attacks. In late February 2025, Microsoft Defender identified nearly 2 million phishing...

90% of cyber attacks start with a simple email. Why?

All it takes is one email... Did you know it can just take one email to bring your entire business to its knees? Why? Because a surprising 90% of cyber attacks begin with an email. And if you and your whole team are reliant on email every day, your chances of falling...
Woman sitting at her computer with her head in her hands

Protecting your data – Backup and Restore

Protecting your data - Backup and Restore Backing up your business data is critical. What are the different methods of backing up your data? How can you restore lost or corrupted data? These are all important questions for any business to ask themselves. After reading...
A woman looking at her phone while working from home

Homeworking is bad for IT security

A new homeworking security report from CyberArk has surveyed 3000 remote office workers and IT professionals. It finds that increased homeworking, resulting from the 2020 pandemic, could be bad news for a company’s IT security posture. It has uncovered several...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05