It’s the secret to access your protected resources in the network, or the cyber space. Therefore, you have to keep it to yourself only, traditionally.

If we adopt the business continuity concept in personal life, then somehow the secret must be shared with your significant half or else the access is gone forever.

Of couse, this must be arranged in advance like asset escrow but so far no credible service in the market for this cyber entity.

For optimal & practical setup, use 2-step authentication (most portals now have this feature) and store the password in sealed envelop. This is a split secret arrangement. You hold the second factor with you to control access even the sealed envelop is compromised.

Leave a Reply