This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.

Step 3

Beyond Simple
Passwords

Use the tools below to strengthen your passwords and setup multi-factor authentication to protect your devices and accounts.

Creating a Strong Password

Have I Been Hacked

Lock your virtual doors and windows. Just like in the physical world, when you lock everything down, the bad guys may move on. Your accounts and data (such as email, personnel records or client databases) are valuable assets – to you and criminals.

Keep your accounts safer by moving beyond simple passwords: use strong passwords and two-factor authentication (2FA) (an additional layer of protection to your passwords). Be sure to set up unique passwords on all your accounts – use the list of devices and accounts you created in Toolbox “Know What You Have” to help make sure you have everything covered.

3.1 Strong Passwords

Narrow your search by selecting your OS
Bitwarden logo
Type
1
Level
0hr 10min
Time

Bitwarden Password Manager

Use this tool to control your password security in one location.

Type
1
Level
0h 30min
Time

Google Authenticator

Use this tool to install Google Authenticator on your phone and tablet to manage your 2FA passwords.

Type
1
Level
0h 30min
Time

Microsoft Authenticator

Use this tool to manage your 2FA passwords.

GCA logo
Type
1
Level
0h 15 min
Time

Set Up 2FA on Your Accounts

Instructions to set up two-factor authentication on your online accounts.

SpecOps logo
Type
2
Level
0h 30min
Time

Specops Password Auditor

Use this tool to scan your Active Directory and identify password-related vulnerabilities.

Type
1
Level
0h 30min
Time

Turn On 2FA for Your Accounts

Use this tool to configure your online accounts with 2FA.

Have I Been Pwned logo
Type
1
Level
0h 10min
Time

Have I Been Pwned?

Use this tool to see if your password has been compromised.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

Recently Added GCA logo

How to Recover from Password Exposure

This free guide that contains steps for recovering from such incidents where your password may have bene exposed. It highlights...

Read More
Recently Added Wizer Logo

Security Awareness Training

Wizer Training Awareness videos engage and educate through short animated explainers and dramatized real-life scams for business...

Read More
Recently Added NCSC logo

Browser-Based Password Managers

Should I use a browser-based password manager? Many web browsers now come with password managers built in, and they can be...

Read More
GCA logo

Beyond Simple Passwords - Backgrounder

Download the attached PDF to find out why it’s important to use strong, unique passwords on all your accounts and 2 Factor...

Read More

Creating Strong Passwords and Two-Factor Authentication

GCA created the GCA Learning Portal to offer additional training and resources supplemental to the Cybersecurity Toolkit....

Read More
Password Manager logo

Password Manager

PasswordManager.com provides information regarding online and password security, including how to choose the best password...

Read More

Access Control Policy

This sample policy will assist your organization in documenting the controls in place that prevent unauthorized access to...

Read More

Salesforce Trailhead

Salesforce Trailhead is a place where you can learn in-demand skills, earn resume-worthy credentials and connect to career...

Read More

Authentication Policy

Use/customize this template to build your company's authentication policy.

Read More

How to Create Strong Passwords

Watch this video to learn how to create strong passwords.

Read More

Why Password Reuse is Dangerous

Watch this video to understand the importance of creating and maintaining strong, unique passwords.

Read More