We split the monthly mortgage and utility bill payment duties between my spouse and me. To keep the house functioning in the terrible case of one of us dying, the other will need to be able to get into our accounts. Not only do home accounts need to be taken into account; after one of us passes away, closing down online bank accounts, social media accounts, video streaming service subscriptions, and many other online accounts could be a difficult and time-consuming procedure. We can both access our home and personal accounts when the other cannot thanks to the development of password managers with digital inheritance possibilities.

The most helpful legacy you leave behind can be granting a trusted individual access to your password manager vault. A guide for preparing your digital life for death is available from PCMag. Along with that tool, I have put together this list of the top password managers with options for digital inheritance.

THE BEST PASSWORD MANAGERS WITH ELECTIONS FOR DIGITAL LEGACY See which password management systems offer digital legacy choices in PCMags evaluations. Following is a list of password managers in alphabetical order:

Keyboard Boss

Talk to the folks who will inherit your passwords for your online accounts about your online account inheritance strategy. Tell them the password manager you use and offer them detailed directions for gaining access to your online safe.

HOW TO MAINTAIN THE SECURITY OF YOUR ONLINE ACCOUNTS AFTER DEATH Each password manager on the above list has a unique method for transferring passwords. Some let you decide whether to give recipients complete access to every item in your vault (which can contain credit card and bank account information) or to restrict access to specific areas. There are password managers that allow you to grant vault access to a trusted contact while you are away, for example, if you are anticipating major surgery and won’t be able to access your accounts for a short period of time. The password manager locks down after the time constraints are up till you may access it again.

Remember that possessing a password for an online banking account is not the same as possessing someone else’s money. You risk getting in trouble with the law if you take money from an account that is not yours. Get in touch with the bank before attempting to access a deceased person’s account if you need to close their bank accounts. Banks have their own procedures for processing account closures and distributing financial bequests. Make sure you designate them as a beneficiary on the account or identify them as a joint account holder if you want to ensure that someone will be eligible to collect the funds in one of your accounts after your passing. It won’t help if you give them your banking login credentials.

Do you enjoy what you’re reading? Receive a weekly additional story in your mailbox. Register to receive the SecurityWatch newsletter.

WHAT ELSE HAPPENED THIS WEEK IN THE SECURITY WORLD? Meta is being sued for using health data to target advertisements. According to the class-action lawsuit, Meta obtained the data using an ad-targeting tool provided by the business and installed on patient websites.

Microsoft Discovers Cyber Spies Using Adobe Zero-Day Exploits and Windows. Microsoft has discovered proof that the zero-day exploits for the Subzero malware were being used by the Austrian intelligence agency DSIRF.


Alt text for the top password managers
Alt text for article images

Has There Been a Data Breach? Now follow these 3 steps. How data breaches occur and what to do if you’ve been affected are explained by PCMag.

A new Amazon Echo product? 8 Alexa Preferences to Modify Right Away. Although Amazon’s voice assistant may be helpful, its default settings aren’t the safest or most private. Here’s a solution to that.

Identity theft: 5 Ways It Can Destroy Your Life. Although identity theft is a serious issue, what actually occurs when your identity is stolen? Let us explain it to you.

APPRECIATE WHAT YOU JUST READ? For direct delivery of our top privacy and security stories to your inbox, subscribe to the SecurityWatch newsletter.

Advertisements, discounts, and affiliate links could be found in this newsletter. You agree to our Terms of Use and Privacy Policy by subscribing to a newsletter. You are always free to unsubscribe from the newsletters.


You may also like