This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.
Action Required!
Please select your Toolkit.


Beyond Simple Passwords

Your passwords are the first line of defense for you devices and accounts. Strong passwords and multi-factor authentication help protect your data. Explore tools to strengthen your passwords below.

Creating a Strong Password

Have I Been Hacked

So, you have been taking the steps necessary to know what you have, who can access it, and ensuring that settings are secure and updates are being done. The next crucial step is making sure you aren’t leaving your systems, applications or devices open for unauthorized access. Lock your virtual doors and windows. Just like in the physical world, when you lock everything down, the bad guys may move on. Your accounts and data (such as email, personnel records or databases) are valuable assets – to you and criminals.

Keep your accounts safer by moving beyond simple passwords: use strong passwords and two-factor authentication (2FA) (an additional layer of protection to your passwords). Be sure to set up unique passwords on all your accounts – use the list of devices and accounts you created in Toolbox “Know What You Have” to help make sure you have everything covered. Use this toolbox to access tools that help you create and manage strong passwords and 2FA.

5.1 Tools for 2FA

Narrow your search by selecting your OS
Have I Been Pwned logo
0h 10min

Have I Been Pwned?

Use this tool to see if your password has been compromised.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

Authentication Policy

Use/customize this template to build your company's authentication policy.

Read More

How to Create Strong Passwords

Watch this video to learn how to create strong passwords.

Read More

Why Password Reuse is Dangerous

Watch this video to understand the importance of creating and maintaining strong, unique passwords.

Read More