I have all the passwords and logins for all the sites we use from AAA to our HOA site to airlines to social media networks, etc, etc. In addition, I also manage all of your digital media including photos, videos and important digital documents. Complicating the situation is that I run a business that is totally digital: blogging! I have several sites, tied to their own individual bank accounts and online identities spanning ad networks deals, social media pages, hosting sites, etc.

If you were to become incapacitated or pass away, your family would be in for a tough time. Your loved ones wouldn’t know about all of your bank accounts, investments, and online accounts - which could lead to a lot of confusion. Additionally, if you had any digital assets stored in the cloud, they would be inaccessible without your password. This would leave your digital identity in a state of chaos. ..

The only saving grace is that she knows my master password and has access to my two-factor authentication device, which would allow her to access a list of all my sites and logins. However, she wouldn’t even know where to start since she’s never done it before. ..

I’ve been thinking about how to protect my digital legacy for the past few weeks, and I’ve come up with a few possible solutions. The first is to create a will. This is something that I’ve never really thought about before, but it’s definitely something that I need to do if I want to leave my digital estate in good hands. The second is to set up a digital tombstone. This is something that I’m definitely going to have to do if I die suddenly or if something happens to me while I’m still living. The third solution is to create an online memorial account. This is something that I’m going to have to do if someone wants me dead or if they want me preserved for posterity. The fourth solution is to set up a secure online storage account. This is something that I’m going to have to do if someone wants me dead or if they want me preserved for posterity. And the last solution is justto be careful about what information we put online or in digital form. We don’t want anyone getting their hands on our personal data or our memories without us knowing about it first!

Firstly, Get It All Together

There are a couple of ways to store information with your significant other or family member. The most secure way is to have the information stored on a separate device that only the two of you have access to. Another option is to have the information stored on your computer, but make sure that you encrypt it so that no one else can access it. ..

-Generate a list of important information using a password manager app or writing it down. -If you are not comfortable with online security, generate a list of information using a physical method such as writing it down or typing it up.

Both KeePass and LastPass offer different features and advantages, so it’s important to choose the right one for your needs. KeePass is great for local storage, while LastPass is better if you want to have a centralized location for all your passwords. ..

LastPass is a password management tool that has other security features like a one time password. With a one time password, you could store this in a secure location like a home safe and your spouse could use this password to log into your account if something were to happen to you. The nice thing about a one time password is that it expires after you log in once. So you don’t have to give out your master password nor store it anywhere that is not as secure as you would like. ..

The best way to protect your information is to collect as much information as possible. KeePass and LastPass can help you keep all of your login information together so you can easily access it if needed.

Secondly, Secure It All

LastPass and KeePass are two of the most popular password managers on the market. They both have secondary authentication options, which makes your data even more secure. If you don’t have a strong password, you may want to consider using one of these two password managers to help keep your information safe.

Even with encryption and two-factor authentication, however, the data can still be compromised. For example, if you end up with spyware or malware that runs secretly in the background, it could easily capture everything you type in. In terms of actually getting access to your entire database, that would be much harder since the data is heavily encrypted by default. Even if the malware were to copy your database file to their computer remotely, they would not be able to crack it in any humanly feasible amount of time even with many fast computers. ..

It is important that the computer you use to compile all of this information is clean before you start. If you’re doing a lot of copying and pasting, malware can capture what’s in the clipboard before it gets into the encrypted database. Also, if someone can remotely control your computer, then they can open the programs (if left open) and get all the information they need. That’s why it’s also essential to close the database if you’re not using it (KeePass) and to set a short timeout if you are using the browser extension (LastPass).

LastPass is a security risk because if someone takes over your computer and you’re logged into LastPass, they can just export a file with all logins and credentials and transfer it to themselves in a few minutes or less.

LastPass has a lot of security features to protect your account. For example, if you close the browser, LastPass logs out and if someone else comes by and opens the browser, they’ll have to login again. You can also have it so that it logs out after a certain amount of idle time. I set this to a few minutes because I don’t want the ability for someone else to access my account while I’m not there and the browser window is open.

KeePass is a security tool that helps protect your data. It has the ability to confuse keyloggers, and can also be linked to your Windows account.

The two most popular methods for storing login information are either using a digital option like a password manager or writing everything down on paper. I would highly advise against using a program like Word and then printing the file. The main issue being that while you are creating the file, it’s wide open to attack and not encrypted. Plus you have the chance of forgetting about it altogether, thereby opening yourself up to all kinds of problems. It will obviously take quite a bit of time to compile the list, so it’s best to use something secure while you do it. ..

After exporting the database to a printed version, you could delete the database or online account if you felt uncomfortable with its contents.

Thirdly, Get a Lawyer

When someone dies, their bank account may be frozen. If you don’t have a power of attorney set up, your wife may not be able to access any money until after the estate is settled. This can add more stress to an already super-stressful situation. ..

A proper lawyer can help you create a will and power of attorney, which will give you the authority to manage your affairs if you cannot do so yourself. It is important to get these documents setup correctly, as giving someone unauthorized access to your accounts after you die could lead to legal trouble. To avoid this, make sure to keep your power of attorney information confidential and store it in a safe place. ..

Fourthly, Write a Guide & Store It

  1. Make sure you have a backup of all your important data and documents.
  2. Create a document that explains how your accounts are setup, what accounts are important, and how to access them.
  3. Print this document and store it in a safe deposit box in a bank. ..

If you have something important that you want to keep safe, it’s always a good idea to store it in a public place where someone has to go in order to get it. This way, there’s less of a chance that something will happen after the person dies that could cause problems for you. ..

If you don’t want to store the entire password and login list in the safe deposit box, you can keep a master password and a single, easily guessed password for use only when needed.

Conclusion

Many people don’t think about digital identity transfer after death because it’s not something that typically comes up. My wife and I created a will a long time ago, but I realized that wasn’t enough. She’ll need to have a trust and power of attorney to manage everything properly. ..

We would love to hear your thoughts on how you collected and stored sensitive information. Did you use any tools or processes to collect and store this information? Let us know in the comments below!