Password Manager Guide (2025): Pick One, Set It Up Right

Riley Ortega ~11 min read
Password manager vault with passkeys and 2FA icons on a dark gradient
Photo via Lorem Picsum

AdSense in-article ad (replace with your code)

Good security feels boring. The goal isn’t to memorize everything—it’s to never reuse passwords, add 2FA where it matters, and let passkeys log you in without drama. This guide shows exactly how to choose a password manager in 2025 and set it up for yourself, your family, or a small team.

How to choose a password manager in 2025

Ignore brand wars; focus on the security model and the daily experience. Your pick should:

Everything else—icons, themes, fancy dashboards—is secondary. Pick the one that feels obvious in your browser and phone, then actually stick with it.

  1. Create a strong master password: a 4-5 word passphrase beats complex gibberish you’ll forget. Example pattern: noun-verb-adjective-noun-year. Store a paper copy in a safe.
  2. Turn on account 2FA for the manager itself. Prefer security keys (hardware) or platform keys (Face ID/Touch ID + device secure enclave). Use TOTP only as a backup.
  3. Enable passkey sync/backup inside the manager or your OS keychain. This lets you sign in with a face/fingerprint and no password on many sites.
  4. Import existing logins from your browser or old manager. Clean as you go—merge duplicates, remove dead sites, label work vs personal.
  5. Autofill rules: keep autofill on, but disable “auto-submit” where it misfires. Add domain aliases for services that log in from multiple URLs.
  6. Create shared collections for household logins (streaming, utilities, kids’ school portal). Give each person the right level of access.

Passkeys in 2025: when to use them (and how they live with passwords)

Passkeys replace passwords on sites that support them. They’re phishing-resistant and sign in with your device’s biometric. You can:

If you share an account, check whether your manager supports shared passkeys. If not, create individual logins for each person when possible (best practice anyway).

About TOTP 2FA codes inside your manager

There are two camps: keep TOTP codes in your password manager for convenience, or keep them in a separate authenticator for extra separation of risk. Our stance:

Whichever you choose, confirm you can export TOTP later (QR codes/secret keys). Avoid lock-in.

Import & migrate without chaos

  1. Export from the old place (browser or manager) to an encrypted file if available. If CSV is the only option, keep it offline and delete after import.
  2. Map fields (URL, username, password, notes, TOTP secret). Most managers auto-detect common formats.
  3. Deduplicate: merge exact duplicates; keep the newest password. Tag entries you’ll rotate later.
  4. Test logins for banking, email, cloud storage first—your critical path.
  5. Shred the export (secure delete) once you verify the vault.

Families & small teams: tidy sharing that won’t backfire

Emergency access & recovery

“What if I lose my phone?” or “What if I’m unavailable?” Solve it now:

Security model basics (plain English)

No manager is magic. Phishing still works if you type credentials into a fake site. Use domain matching and never follow login links from email—open the site directly.

Monthly 10-minute routine (copy this)

  1. Open your manager’s security report: fix weak/reused passwords and enable 2FA where missing.
  2. Rotate any shared passwords you gave to guests/contractors.
  3. Review vault members (family/team): remove anyone who no longer needs access.
  4. Export a backup (encrypted) to your external drive or secure cloud folder. Keep at least one offline copy.

When a service you use gets breached

  1. Don’t panic; change the password immediately through the site (not email links), then update it in your vault.
  2. Enable/refresh 2FA. If codes were exposed (rare), re-enroll TOTP or switch to a security key.
  3. If it’s your email provider, also check forwarding rules and recovery addresses for tampering.

FAQ

Q: Do I still need a password manager if I use passkeys?
A: Yes, for all the sites that haven’t switched yet and for storing secure notes, IDs, and payment data. Your manager also helps back up and sync passkeys.

Q: Is iCloud/Google/Microsoft’s built-in manager enough?
A: For single-ecosystem users, maybe. But dedicated managers usually offer better cross-platform support, sharing, auditing, and export options.

Q: Should I store my bank TOTP in the same manager?
A: If convenience is key, yes—with strong device security. For maximum separation, keep bank TOTPs on a separate authenticator or a hardware key.

Q: What about browser-saved passwords?
A: Export and move them into your manager, then disable the browser’s saver to avoid duplicates and confusion.


Riley Ortega portrait
Riley Ortega

Editor at TechPulse Daily. Covers practical privacy, backups, and the tiny changes that make accounts safer. About us.

Related reads