How to Use LastPass Password Manager

This article will show quick tips and video tutorials on how to use LastPass to create, store, and share passwords with your organization…

Every organization should use a secure password management tool like LastPass, 1Password or Roboform to help store sensitive information. Using a tool like LastPass ensures everyone within your organization is using separate, complicated passwords on each website visited.

LastPass Tips & Video Tutorials

Browser Extension

You’ll primarily use the app through Chrome/IE extension.  The video below will show you how to install the browser extension onto the browser you are currently using.

Creating Secure Passwords is Easy!

You’ll need to do this for NEW sites that you go to, as well as sign into existing websites, then go through each site’s process for changing your password.  Here’s a quick video on how to create passwords.

The Vault

The Vault is the place where all of your passwords are stored – protected by your master password.   You can organize your passwords by folder here, and share them with others.  This video shows you how to access the vault.

LastPass Enterprise

Is your team using LastPass Enterprise or thinking of using it? This video tutorial demonstrates what you need to know when starting an account and using LastPass as your organization’s password manager.

25 Cost-effective Tools to Drive Your Small Business Forward

Boost productivity with the right tools! Check out our blog on essential productivity tools designed specifically for small businesses. Discover how these Teal-tested solutions can streamline workflows, improve team collaboration, and drive growth.

Don’t Stop Here

More To Explore

CybersecurityThreats

What Are Advanced Persistent Threats?

Many different cyber threats keep business owners awake at night. However, one cyber threat flies under most organizations’ radar even though most IT professionals have been ranking it as one

Identity

11 Key Ways to Protect Your Online Presence

Identity crimes, like other cybercrime activities, are always changing and adapting. Internet access provides easy access to potential victims at an inexpensive cost to cybercriminals. Unfortunately, people do not take