7 Questions To Ask Before Investing in VoIP

So you are thinking of moving your office phones over to VoIP? Before you do that, do yourself a favor and read this blog post. It will not only save you money, it will educate you about the various details of VoIP phones. 

Back to posts

How to Choose a Password Manager

How to Choose a Password Manager



During a time when cyber crime is at an all-time high, computer security is a major concern for the modern business. Most businesses are still dependent on passwords as their main source of computer security, but creating separate, complex passwords and

changing them periodically for each login is an arduous process. Fortunately, there are programs designed specifically to manage your passwords to make your life much simpler, while supplying you with the peace of mind that you have the best passwords possible.


Using a Password Manager

Password managers are a great tool for the busy professional. Attempting to keep a notebook, spreadsheet, or document is both time consuming and risky. Instead, we recommend you use an app where you input your password for different websites, and then password manager app automatically inputs that password anytime you access the location where it's needed. As your password collection grows, using an app will be much simpler than trying to keep track of all your different passwords.


Typical features of a Password Manager

Most password managers operate with a master 

New Call-to-action

password in case of an emergency or reset to the system. It is important to know whether or not your program uses a model that stores the master password in its online database, because if hackers attacked the company’s servers, they would obtain the means to every file locked behind a password because of their acquisition of the master password.


Some password managers now claim to provide better security by never having the master password stored in their database. This allows all of the password decryption to be done locally at point of entry, and if hackers were to compromise the company’s servers, they would not gain access to the master password. However, using this type of password manager does not protect against cyber attackers using keylogging malware done from the actual computers that use these passwords.


See also: 4 Easy Ways to Protect Your Business Information from Hackers


Fortunately, there is a second step to take when choosing a program for your computer security. You want to choose a manager that requires the master password to be entered on an authenticated device. Requiring an authenticated device prevents the attackers from entering the master password on their own devices and accessing the systems remotely.


Another step to take is finding a password manager that logs you out after a certain amount of time of inactivity. This basic step prevents another user from accessing confidential information if the you have stepped away from your computer or other device after signing in.


Password Manager Comparison

Password managers are program or apps that can be downloaded to a computer of phone. Some of them are secure and easy to use, and some of them are not. Let’s take a look at some pros and cons of a few of these programs:




  • Experience – LastPass is one of the first well-rounded password managers available

  • Includes option to automatically change passwords if a server is compromised

  • Supports two-factor authentication.



  • Requires extra fees to access all features
  • A long time between updates.




  • User-friendly interface

  • Will reset to computer-generated passwords if requested

  • Syncing between devices is seamless.



  • One of the newer password systems
  • Too many updates of features that should be standard
  • Costly to sync over multiple devices.




  • Free
  • Portable: can be used from a flash drive on any device
  • Passwords can be shared with different users.



  • Only supports Windows, OSX, and Linux systems
  • Sharing ability lowers security.


Choosing a password manager to enhance your computer security is becoming a requirement in today’s technologically advancing world. However, choosing the manager that meets your needs while providing you with the security you need is just as important. Do your research and choose wisely!

Kevin Gray
Hello! I am the Vice President @ EnvisionIT Solutions. | Technology Expert | Author | Speaker | Small & Medium Business IT Support - We founded EnvisionIT Solutions in 2007 to provide IT services and support for business owners/CEOs who value the necessity of technology to drive their success and growth.

Find me on:


21 Questions To Ask Before Hiring An Honest, Competent, Responsive, Fairly-Priced Computer Consultant

Don’t trust your company’s critical data and operations to just anyone! This business advisory guide will arm you with 21 Revealing Questions you should ask any computer consultant before giving them access to your network.

21 Questions

Recent Posts

7 Questions To Ask Before Investing in VoIP

So you are thinking of moving your office phones over to VoIP? Before you do that, do yourself a favor and read this blog post. It will not only save ...

Read more

Four Common Misconceptions About VoIP

VoIP is often mysterious to most business owners due to the fact that it is a fairly new technology. Unfortunately because of this, there are some mis...

Read more

VoIP is VoIP Right?

  With so many companies implementing the same protocol to get calls onto the internet, you’d think one would work just the same as another. Unfortuna...

Read more

Who Uses VoIP and Why?

  Why is VoIP such a big deal these days? Businesses with employees in multiple locations have found that VoIP enables them to connect through a singl...

Read more