How does a password manager work?

For some, it is a strategy to remember a particularly complex password for all accounts. But once this is cracked, cyber criminals can access all sensitive data. For this reason, it is safest to have a separate, complex password for each account - even though that means managing several dozen credentials. If you lose track of things, a password manager can help.

Password managers are programs that manage usernames and passwords. Password managers keep passwords safe using encryption and a complex master password. They function similarly to a notebook that is locked in a drawer and whose contents can only be viewed by the owner. The advantage is obvious: instead of many different passwords, you only have to remember one.

Advantages of the password manager:

  • Storing passwords and usernames using encryption
  • Support in password assignment : e.g. B. by generating strong combinations and identifying already used or weak terms.
  • Warning about compromised websites and possible phishing attacks , e.g. B. if the URL of the website accessed differs from the one saved.
  • Synchronization possible: If you want to use online services on multiple devices such as computers and smartphones with different operating systems, you can use a program that synchronizes them.

Save passwords with the password manager

Depending on the program you choose, the passwords are stored either locally on the device or in the provider's infrastructure - often cloud-based - for synchronization across various systems.

Standalone password manager program

Once standalone programs have been activated and set up, a pop-up window appears if the user name and password are required to use an online service. A centrally stored master password must then be entered that protects all access data.

Password manager integrated into the browser

Many web browsers already offer an integrated password manager that can be used without much effort. Once set up, it acts independently and the program becomes active when you visit a website if access data is required there. However, since browsers are complex programs that do not treat this topic with top priority, the access data can be relatively easily extracted by malware and thus misused by an attacker.

Using a master password offers a minimum level of protection, but users should always carry out the latest updates. Access to the computer, tablet or smartphone should also be secured, e.g. B. by a PIN or password query.

Disadvantages of the password manager:

  • If you forget the master password, in the worst case scenario, all data will be lost: This often means a lot of work, as the individual access to the accounts has to be restored individually.
  • All passwords can be stolen at once if a cyberattack on a password manager is successful.
  • With cloud-based services, you typically trust one company with access to all of your sensitive data . It is worth taking a look at the terms and conditions and data protection declarations of the respective manufacturer. The information about the location of the cloud service provider and the servers provides information about which data protection law the data is subject to.

Is a password manager worth it?

Yes, it is usually worth using a password manager. In any case, it is better than using common passwords repeatedly. The specific decision about which program to use requires individual consideration of the respective use. It is also about assessing the associated risk.

Save passwords – with a second factor

It is best to set up extended protection in the password manager for your highly sensitive content. This can be achieved by setting up a second factor for important accounts. Then, for example, a confirmation code could be sent to another device such as your smartphone to clearly authenticate the process. Important accounts include, for example, your email accounts. Because if third parties gain access to it, they can cause significantly greater damage. On the one hand, they could access your email data and also send messages on your behalf. Cyber ​​criminals with access to your email account can also take over other online services by resetting passwords.

Checklist:

  • Email to social media: Which accounts do you need a password manager for?
  • Browser-based or standalone: ​​Which program best suits your online habits?
  • Cloud or hard drive: Where is your data backed up?
  • Sensitive data: Do you need a second factor for authentication ?
  • Complex combinations: Do you have a secure master password?

You might also be interested in:What does your password have to do with pizza?”

Source: Federal Office for Information Security


If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:

📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.

Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!

* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!


Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )