Rule 01
Unique secrets beat clever secrets
A mediocre random password that is unique per site is far safer than a clever personal pattern reused everywhere. Uniqueness is the real force multiplier.
Guide
A short operational doctrine for the human layer: unique passwords, password managers as the default platform, recovery flows treated as part of authentication, and passkeys deployed where compromise hurts most.
Rule 01
A mediocre random password that is unique per site is far safer than a clever personal pattern reused everywhere. Uniqueness is the real force multiplier.
Rule 02
The vault is where account security starts: generation, autofill, breach monitoring, and secure sharing all live there. Human memory should not be the core defense layer.
Rule 03
Backup email, phone numbers, helpdesk flows, and recovery codes need the same scrutiny as the primary password. Attackers often choose the easier side door.
Rule 04
Primary email, cloud admin, finance, source control, and identity providers should be first in line. Those accounts determine what else can be reset or impersonated.
Operating Principle
Passwords, MFA, backup codes, device trust, and helpdesk resets should be treated as one control surface. Attackers do not care which piece fails first.
Team Practice
If a team credential is copied into chat, plain text docs, or screenshots, it is already drifting away from control. Vault-based sharing creates revocation and auditability.