This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.

STEP 5

Beyond Simple Passwords

Your passwords are the first line of defense for you devices and accounts. Strong passwords and multi-factor authentication help protect your data. Explore tools to strengthen your passwords below.

Creating a Strong Password

Have I Been Hacked

So, you have been taking the steps necessary to know what you have, who can access it, and ensuring that settings are secure and updates are being done. The next crucial step is making sure you aren’t leaving your systems, applications or devices open for unauthorized access. Lock your virtual doors and windows. Just like in the physical world, when you lock everything down, the bad guys may move on. Your accounts and data (such as email, personnel records or databases) are valuable assets – to you and criminals.

Keep your accounts safer by moving beyond simple passwords: use strong passwords and two-factor authentication (2FA) (an additional layer of protection to your passwords). Be sure to set up unique passwords on all your accounts – use the list of devices and accounts you created in Toolbox “Know What You Have” to help make sure you have everything covered. Use this toolbox to access tools that help you create and manage strong passwords and 2FA.

5.1 Tools for 2FA

Narrow your search by selecting your OS
SpecOps logo
Type
2
Level
0h 30min
Time

Specops Password Auditor

Use this tool to scan your Active Directory and identify password-related vulnerabilities.

Have I Been Pwned logo
Type
1
Level
0h 10min
Time

Have I Been Pwned?

Use this tool to see if your password has been compromised.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

Recently Added GCA logo

How to Recover from Password Exposure

This free guide that contains steps for recovering from such incidents where your password may have been exposed. It highlights...

Read More
CTCL logo

Cybersecurity 101 for Election Officials

Data breaches, ransomware, denial-of-service attacks, and misleading election information are regular headlines in America,...

Read More
Password Manager logo

Password Manager

PasswordManager.com provides information regarding online and password security, including how to choose the best password...

Read More

Access Control Policy

This sample policy will assist your organization in documenting the controls in place that prevent unauthorized access to...

Read More

Authentication Policy

Use/customize this template to build your company's authentication policy.

Read More

How to Create Strong Passwords

Watch this video to learn how to create strong passwords.

Read More