Choose a password manager that fits your devices, budget, and technical comfort level.
Password Manager Setup
The setup most people delay for years takes about two hours. This checklist covers every step — choosing the right manager, creating a master passphrase you'll actually remember, migrating what you already have, and locking down recovery options before you ever need them. For more background and examples, see the guidance below; for built-in tools and options, use the quick tools guide.
Checklist Items
0 done•27 left•5 of 6 sections collapsed
Create your account directly on the official website — not through an app store link or a search ad.
Install the browser extension for every browser you use regularly — this is what you'll interact with daily.
Install the mobile app and configure it as your phone's autofill provider.
Confirm the extension and app are both connected and unlocking correctly before proceeding.
📖 How your reused passwords get exploited — automatically and at scale
When any website is breached, the stolen credentials typically appear for sale on underground markets within days. Automated tools then test each username-and-password pair against hundreds of other services simultaneously — a technique called credential stuffing. No human effort is required per attempt; the tool simply runs down the list and logs every successful match. Someone who reused a forum password from 2019 might find their Amazon or PayPal account compromised years later, once that forum's database was purchased and fed into an attack script.
The breach-to-attack timeline has compressed sharply. In 2018, researchers estimated the average gap between a credential breach and its first weaponized use was over a year. By 2023, that window collapsed to days or hours for freshly leaked databases. A password that feels old and harmless is still being actively tested somewhere right now — the tools don't care when the breach happened, only whether the credential still works.
💡 What "the company can't see your passwords" actually means
Password managers encrypt your vault on your own device before it ever reaches their servers. The company stores only encrypted data they cannot decrypt — not readable passwords. This is called zero-knowledge architecture. If the company's servers are breached, attackers receive encrypted files, not credentials. This is fundamentally different from how most websites store passwords and from how browser password saving works, where the platform provider can technically access your stored data under certain conditions.
⚠️ What the 2022 LastPass breach actually taught the industry
LastPass suffered a major breach that exposed encrypted vaults. Users with weak master passwords faced genuine risk — attackers could attempt offline brute-force decryption without rate limits, running billions of guesses per second on their own hardware. Users with strong, long master passphrases remained protected because the encryption held. The lesson wasn't "avoid password managers" — it was that your master passphrase is the final barrier, and its strength is the variable that actually determines your exposure if a breach occurs.
🔧 Shared accounts: the coordination problem the checklist doesn't solve alone
Most households share credentials for streaming services, home Wi-Fi, utility portals, and smart home systems. A password manager handles this elegantly through shared vaults — but only if both people use the same manager and a plan that includes sharing. Family plans (available on Bitwarden and 1Password) include a shared vault both accounts can read and update in real time. When the streaming password changes, one person updates the shared entry and the other's autofill reflects it automatically. Without this, the typical workaround is texting the password — creating two out-of-sync copies, neither of which will be updated when the next password rotation happens.
Work accounts present a separate consideration that catches people off guard: credentials owned by an employer should not live in your personal vault. If you leave a job, you don't want to manually sort employer credentials from personal ones, and the employer doesn't want their systems' passwords inside a vault they no longer control. Consider maintaining work credentials in a separate vault or using a manager your employer provisions — many organizations provide 1Password Business or Bitwarden Teams accounts for exactly this reason.
🧮 What an account takeover actually costs — beyond the headlines
| Account type | Typical damage | Recovery friction |
|---|---|---|
| All linked accounts at risk; contacts receive phishing from your address | Days to weeks; cascading damage | |
| Online banking | $200–$10,000+ in fraudulent transfers; Regulation E disputes take weeks | Weeks; partial financial recovery |
| E-commerce | Fraudulent orders shipped to third parties; stored card data exposed | 3–10 days for chargebacks |
| Social media | Account sold, used to scam your contacts, or ransomed back to you | Days to permanent loss |
| Cloud storage | Files ransomed or leaked; sensitive documents exposed permanently | Varies; sometimes irreversible |
Financial damage from a bank breach is often partially recoverable with enough persistence — filing disputes, working with fraud departments, and waiting. The non-financial costs are consistently underestimated: hours spent on hold, credit freeze filings, identity monitoring subscriptions that run for years, and the sustained low-grade anxiety of not knowing what the attacker accessed or copied before you regained control.
✅ How to know when you're actually done — not just started
Many people import their browser passwords, see a large vault, and consider themselves finished. They're roughly one-third of the way there. The setup phase is genuinely complete when: your vault contains entries for every account you use regularly — not just browser-saved ones — the security audit shows zero reused or compromised passwords, your email and every financial account has both a unique generated password and an active 2FA method, you've successfully logged into the vault from your phone at least once to verify the mobile setup is functional, and your recovery documentation is physically filed somewhere you could find it under pressure.
After that point, your interaction with the manager becomes largely passive. Autofill handles the overwhelming majority of logins without you thinking about it. The generator handles every new signup. The audit surfaces new issues in the background. The active time investment drops to a few minutes per month. Most people find that after 30 days of consistent use, the idea of creating or typing a password manually feels as strange as calculating a spreadsheet by hand when software exists to do it instantly.
Master This Checklist Quickly
Every important button and option for this pre-made checklist, shown in a glance-friendly format.
Start Here
- 1
Click any item row to mark it complete.
- 2
Use the note row under each item for quick notes.
- 3
Use the tool row for undo, redo, reset, and check all.
- 4
Use Save Progress when you want to continue later.
Checklist Row Tools
Top Action Buttons
Share
Open all sharing and export options in one menu.
Add & Ask
Open one menu for apps and AI guidance.
Copy and customize
Create a new editable checklist pre-filled with your chosen content.
Save Progress
Adds this checklist to My Checklists and keeps your progress in this browser.
Most Natural Usage
Track over time
Check items -> Add notes where needed -> Save Progress
Send or export
Open Share -> Choose format -> Continue
Make your own version
Copy and customize -> Open create page -> Edit freely
Checklistify
Free Printable Checklists
Password Manager Setup
The setup most people delay for years takes about two hours. This checklist covers every step — choosing the right manager, creating a master passphrase you'll actually remember, migrating what you already have, and locking down recovery options before you ever need them.
Choose and Install
Create and Protect Your Master Password
Migrate Your Existing Passwords
Lock Down Your Recovery Options
Audit and Update Weak Passwords
Build the Habits That Make the System Work
Additional Notes
Use this space for follow-ups, reminders, and key references.
