Lesson 3: Password Management and Access Control
📚 Introduction
Passwords are your company’s first line of defense. Weak passwords, reused passwords, and insecure login methods are a gift to hackers.
This lesson will teach you:
- How to create strong passwords
- How to store and manage them safely
- Why two-factor authentication (2FA) is essential
- Why Authenticator apps and physical security keys are the best options
How to Create Strong Passwords
- Minimum of 12 characters.
- Must include uppercase, lowercase, numbers, and special symbols.
- Never use personal information like birthdates, names, or favorite sports teams.
- Avoid common words or simple patterns like “Password123” or “qwerty.”
Why You Must Never Reuse Passwords
- If one account is hacked, reused passwords will open the door to your other accounts.
- Hackers use password databases from past leaks to try old passwords on new platforms.
- Always use a unique password for every system.
How to Manage Passwords Safely
- Use a reputable password manager (like LastPass, 1Password, Dashlane, Bitwarden).
- Password managers can:
- Create strong, random passwords for you.
- Save all your login details securely.
- Fill in passwords automatically, avoiding manual typing mistakes.
- Never write your passwords in notebooks, Excel files, or sticky notes.
Two-Factor Authentication (2FA) Must Be Enabled
Passwords alone are no longer enough. Two-factor authentication adds a second layer of protection.
Common 2FA Types:
- SMS Codes (Weakest)
- Can be intercepted or bypassed using SIM-swapping.
- Email Verification Codes (Weak)
- If your email is hacked, the attacker can access everything.
- Authenticator Apps (Highly Recommended)
- Apps like Google Authenticator, Microsoft Authenticator, or Authy.
- They generate time-based codes that change every 30 seconds.
- The codes work even if your phone is offline.
- Much safer than SMS or email.
Advantages of Authenticator Apps:
- Harder to steal.
- Not vulnerable to SIM-swapping.
- Works independently of mobile network.
Tip:
Install the Authenticator app on your smartphone.
When setting up 2FA, always choose the “Authenticator App” option instead of SMS when available.
Physical Security Keys (Maximum Security)
- Devices like YubiKey or Google Titan Security Key.
- You plug them into your computer or tap them via NFC on your phone.
- They provide extremely strong, physical protection.
- Even if someone knows your password, they cannot log in without your physical key.
Advantages:
- Almost impossible to hack remotely.
- Extremely fast login with a single tap.
- Recommended for company executives, administrators, or anyone with access to sensitive data.
❌ What You Must Never Do
- Never share your passwords by email or chat.
- Never store passwords in your browser without a password manager.
- Never disable 2FA for convenience.
Summary: Your Password and Access Checklist
✔️ Use unique, strong passwords for every account.
✔️ Always use a password manager.
✔️ Enable two-factor authentication on all accounts.
✔️ Prefer Authenticator apps over SMS.
✔️ Use physical security keys if available.
✔️ Never share or write down your passwords.
Time to Test Your Knowledge!
Let’s see if you’ve mastered password security and access control.
✔️ The quiz will give you instant feedback.
✔️ You can retake the quiz as needed.
👉 Good luck! Let’s begin.
Get up to 70% off on NordPass Premium Plans
Affiliate link — helps keep our training free.



