Step 3
Beyond Simple
Passwords
Use the tools below to strengthen your passwords and setup multi-factor authentication to protect your devices and accounts.
Keep your accounts safer by moving beyond simple passwords: use strong passwords and two-factor authentication (2FA) (an additional layer of protection to your passwords). Be sure to set up unique passwords on all your accounts – use the list of devices and accounts you created in Toolbox “Know What You Have” to help make sure you have everything covered.
Use this tool to scan your Active Directory and identify password-related vulnerabilities.
Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.
This free guide that contains steps for recovering from such incidents where your password may have bene exposed. It highlights...
Wizer Training Awareness videos engage and educate through short animated explainers and dramatized real-life scams for business...
Should I use a browser-based password manager? Many web browsers now come with password managers built in, and they can be...
Download the attached PDF to find out why it’s important to use strong, unique passwords on all your accounts and 2 Factor...
GCA created the GCA Learning Portal to offer additional training and resources supplemental to the Cybersecurity Toolkit....
PasswordManager.com provides information regarding online and password security, including how to choose the best password...
This sample policy will assist your organization in documenting the controls in place that prevent unauthorized access to...
Salesforce Trailhead is a place where you can learn in-demand skills, earn resume-worthy credentials and connect to career...
Watch this video to understand the importance of creating and maintaining strong, unique passwords.
“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.
Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.
Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.
Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.
Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.
Contact Us
[email protected]
Community Forum
https://community.globalcyberalliance.org/