Skip to content

How to connect multiple offices with a VPN

Summary: A VPN enables companies to securely link multiple sites and provides employees with safe access to internal resources.

If your business has multiple locations, you probably want them all to stay connected, right? You need information to flow smoothly between sites, without any hiccups. But it’s not like you can achieve that by just plugging in a few cables. It doesn’t work like that.

What you need is to set up—that is, digitally build—a robust and secure network that can connect multiple offices without ever putting your company’s data at risk. That’s where a VPN enters the scene. Let’s show you how you can use it to create a secure connection between your sites.

Why companies need to connect multiple offices securely

It doesn’t matter if your company connects just two offices or a dozen—once you’ve got one network linking multiple locations, someone might be looking for a way to get into one site and use it as a gateway to others.

That is, if your connection isn’t properly secured, cybercriminals could potentially break into your internal systems from any of the connected sites. Even if not, they might try to intercept sensitive data as it moves between locations. Either way, it could lead to stolen customer information, leaked intellectual property, or exposed communication like internal emails.

And that’s not all. A weak connection between company offices can open the door for malware or ransomware to spread. Just one compromised location can put your entire network at risk. That kind of breach can bring all your operations to a halt and cost you a lot of time and money.

Last but not least, there’s compliance. As you know, many industries have strict data privacy rules—like GDPR, HIPAA, and many others. So, if your office-to-office communication isn’t well protected, you could end up not being compliant with the regulations, which can lead to fines, legal issues, or damage to your reputation.

 
How you can connect to the company network via VPN

Most people think of a VPN—short for Virtual Private Network—as software that hides their device’s IP address and keeps their internet activity private. And that’s true—but VPNs can do more than that. For example, employees can use them to connect securely to their company’s internal network.

So, how does it work from the user’s perspective? This is done using a VPN client—an application that allows your device to connect securely to a VPN server. But instead of connecting to a public or random server, you’re connecting to your company’s own virtual private network.

Of course, that VPN server isn’t open to just anyone. The company must first give you access rights or configure your account to allow VPN access. Then, each time you try to log in, you’re verified, usually through authentication methods such as passwords, TOTP (time-based one-time password) codes, or magic links.

Once you’re authenticated, the VPN client and the company’s server create an encrypted tunnel between your device and the internal network. This allows you to safely access files, apps, and other internal systems—just as if you were in the office, connected to the company Wi-Fi.

Key benefits of using a VPN to connect multiple locations securely

We’d go as far as to say that once a business grows beyond a single headquarters, setting up office-to-office VPN connectivity isn’t just a nice-to-have—it’s essential. Why? Because it brings so many benefits to how teams work and collaborate that it becomes an operational necessity.

Top reasons to use a VPN for connecting multiple sites

Here are a few key advantages of connecting your offices through a VPN:

  • Secure data sharing: By creating encrypted VPN tunnels between your offices, you ensure that sensitive information remains protected during transfer from one location to another.
  • Consistent access to company systems: Employees in different locations—including remote workers—can securely access shared systems, services, and data as if they were all working side by side.
  • Reduced costs: Rather than paying for expensive dedicated connections between offices, a VPN allows you to safely use the public internet at a fraction of the cost.
  • Improved access management: When you connect multiple offices with a VPN, your IT team can easily manage network resources, monitor activity, and enforce strict security policies—all from one central place.
  • Controlled access: VPN gateways let you restrict which parts of the company network employees can access, making sure that everyone can only reach the resources they’re authorized to use.
  • Better collaboration: When teams can share data easily and safely across locations, working together between offices just gets smoother and more productive.

Choosing the right VPN setup for your company

Decided to connect multiple offices with a VPN? Great! Now, the next step is figuring out how to set it up. There are two main options to consider: site-to-site VPN and remote access VPN.

Each of those meets different needs and works in different ways depending on your company’s size, structure, and how your teams connect to resources. So, the setup and management will look different based on which route you take. Because of that, it’s worth taking a little time to learn about both before making a decision. Here’s what you need to know.

Site-to-site VPN

Like its name suggests, Site-to-Site VPN is about connecting entire office networks that are in different physical locations.

The way it works is by using routers or firewalls at each office, which are set up as VPN gateways. These VPN gateways encrypt and decrypt data as it travels between offices. So, data is technically moving over the public internet, but it goes through a secure tunnel from start to finish, which keeps it protected while in transit.

Once configured, these site-to-site VPN tunnels are either always active or automatically turned on when needed. As a result, devices at each location can see and access each other’s resources as if they’re on the same local network—even though they’re actually miles apart.

 

Remote access VPN

Remote access VPN allows individual users to connect to your company’s private network from any location.

So, unlike a site-to-site VPN, which connects multiple office networks together, here each employee’s device uses a VPN client to log in and create an encrypted connection to the company’s VPN server. Once that connection is established, the user gains access to the company’s digital resources. However, administrators can—at any point—control exactly what the user can see and do by using access controls, network segmentation, firewalls, and other security tools.

As the name implies, this setup is best suited for remote work, where employees are spread out around the world but still need secure access to the same company systems, data, and tools to do their jobs effectively. This setup can also be used to connect employees from different offices, treating each office as a remote site.

Best practices for configuring office-to-office VPN

Setting up a secure connection between offices looks different for every company—after all, no two companies have the same number of offices, countries, devices, or systems. But there are a few key things every company should do when setting up this kind of connection, and they are:

  • Properly configure all VPN gateways: Set up the right IP addresses, routing rules, and firewall permissions to make sure data travels securely between locations.
  • Use strong encryption: Ensure data is encrypted while in transit using up-to-date algorithms like AES-256 or XChaCha20.
  • Implement authentication methods: Use techniques like multi-factor authentication (MFA) to ensure only trusted users and devices can connect.
  • Monitor your VPN setup at all times: Watch out for unusual activity or connection problems to catch potential threats before they escalate.

How Nordlayer can help secure your company network

As you’d expect from a truly advanced network access security platform, NordLayer brings the best of both worlds with a secure access service edge (SASE) solution that enables the creation of a hybrid setup combining site-to-site VPN and remote access VPN.

That’s right! With NordLayer, you can create an encrypted connection between your branch offices (Site-to-Site VPN) while also making it possible for individual users to securely connect to your company’s private network (Business VPN)—simultaneously, with advanced access controls for each VPN connection.

With such flexibility, along with features like Always On VPN and support for Zero Trust policies, NordLayer makes it easy to connect multiple offices without compromising your team’s workflows.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

SaaS security: best practices and key challenges

Sorry to tell you this, but moving to software as a service (SaaS) won’t solve your security problems. If anything, it might bring a few more headaches. Don’t get us wrong—using the cloud to run and access your apps from anywhere is a big win for productivity. But it also comes with various security risks, both old and new, that no company can afford to ignore.

More and more businesses are waking up to this. In fact, recent reports show that 86% of organizations now make SaaS security one of their top priorities. In the next sections of this article, we’ll break down what SaaS security actually involves—and how you can make it work for your business.

What is SaaS security?

The term “SaaS security” refers to the measures and security protocols used to protect the data, applications, and infrastructure tied to an organization’s SaaS environment.

To put it differently, SaaS cybersecurity is all about implementing the right strategies to defend an organization against unauthorized access, data breaches, and other cyber threats that may compromise the confidentiality, integrity, and availability of its SaaS-based resources.

So, the core focus of SaaS security requirements is making sure the digital tools and data you use through SaaS services are safe and sound. This is usually achieved by incorporating measures such as encryption (to maintain the confidentiality and integrity of the data), authentication (to verify user access), and access control (to manage permissions). SaaS security monitoring plays a crucial role in overseeing these measures and ensuring their effectiveness. Regular security assessments are also necessary to identify and address potential vulnerabilities.

The most common SaaS security threats

Switching to SaaS is a big shift for businesses, mainly because it often involves giving up some control over how data is handled, how apps are managed, and how systems are customized.

This shift introduces a unique set of risks, particularly when it comes to SaaS data security. Let’s now explore the top 7 challenges organizations face when using SaaS solutions today:

Unauthorized access

SaaS environments are prime targets for cybercriminals because they usually hold valuable data. That means there will always be bad actors trying to sneak into your SaaS apps—often by exploiting weak passwords, stolen credentials, or gaps in access controls. If they get in, sensitive data may be exposed, and unauthorized activity may occur within your systems.

Data breaches

If a threat actor manages to break into your company’s SaaS infrastructure, things can go downhill fast. They might steal sensitive information and leak it on shady websites or dark web marketplaces, where others could easily get their hands on it and potentially use it against your organization. A data breach like this doesn’t just expose valuable company and customer data—it can also lead to serious financial losses and lasting damage to your reputation.

Human error

We all make mistakes—that’s just part of being human. But it’s also what introduces a major risk: we can end up jeopardizing our operations. In the world of SaaS, even minor slip-ups can turn into big problems. Mistakes made by employees—like misconfiguring security settings or falling for phishing attacks—can create serious vulnerabilities in SaaS environments. So, even a single lapse in judgment or a momentary oversight can give threat actors a foothold in your systems.

Insider threats

Of course, not all mistakes are accidents. Sometimes, someone is actively trying to throw a wrench in the works. These incidents are what we call “insider threats.” They occur when employees or contractors misuse their access to harm your company. Whether it’s out of spite, frustration, or a deliberate intent to do wrong, insiders can leak sensitive data or even interfere with your SaaS security tools to put your organization in a tough spot.

Compliance issues

One of the biggest SaaS security risks for today’s companies is non-compliance with data privacy regulations and other industry-relevant standards. Failure to comply with these regulations can result in hefty fines, legal troubles, and reputational damage once word gets out that a company doesn’t handle data with care.

Shadow IT

The term “shadow IT” describes a situation in which employees use unauthorized applications under the radar, meaning they do it without the knowledge or approval of the IT department. We don’t need to tell you that this can pose severe SaaS security risks. When employees stick to using unauthorized tools, they might end up creating insecure connections between those tools and your SaaS infrastructure. And that’s exactly the kind of opening threat actors are looking for.

Vulnerable APIs

Companies often use APIs to connect their SaaS apps with other software—and that’s totally fine as long as those APIs are secure and set up properly. But if those APIs are insecure, poorly designed, or misconfigured, attackers can take advantage of them to break in, mess with your systems, and manipulate your company data.

 

What is SaaS security posture management (SSPM)?

SaaS security posture management (SSPM) is a strategic approach that organizations can adopt to help ensure the security of their SaaS applications. In other words, it involves continuously monitoring, assessing, and improving the security of a company’s SaaS applications to protect them from potential threats and vulnerabilities.

The key benefits include enhanced visibility into the security of SaaS applications, which allows organizations to quickly identify and address any issues. Additionally, SSPM helps ensure compliance with security policies and regulations, reducing the risk of data breaches and improving the overall security posture.

SaaS security: Best practices

When it comes to keeping your software-as-a-service environments safe, it’s crucial to follow best practices. Here are the most important guidelines from what we call “the SaaS security checklist.”

Use data encryption

Encryption is a big part of keeping your sensitive data safe. In simple terms, it scrambles your information into unreadable code that only someone with the right decryption key can make sense of. End-to-end encryption takes it a step further—it locks your data on your device, and only the person you’re sending it to can unlock it. That way, your info stays protected, whether it’s being sent or just sitting in storage.

Implement identity and access management tools

Identity and access management (IAM) tools are essential in software as a service (SaaS) environments for controlling access to applications and data. In essence, IAM solutions help you make sure that only authorized individuals have the necessary permissions, reducing the risk of unauthorized access and data breaches. IAM is also involved in setting up, removing, and overseeing user identities throughout their lifecycle within the system.

Introduce effective authentication methods

Using multi-factor authentication (MFA) is a way to take your organization’s SaaS security standards to the next level. When you enable this feature, users must provide more than just a password—for example, a special code or security token—to verify their identity. As a result, MFA makes it much harder for unauthorized users to get in, adding an extra layer of protection beyond just passwords.

Making MFA a key part of your SaaS security solution can help ensure that sensitive data and resources stay secure. When it comes to implementation, MFA is often enabled through enterprise password managers, identity providers, or network security tools that offer advanced access control.

Become compliant with data privacy standards

Being compliant with data protection standards, such as the General Data Protection Regulation (GDPR) or the Health Insurance Portability and Accountability Act (HIPAA), demonstrates an organization’s ability to handle sensitive data legally and securely. So, if a company wants to keep its data safe, build customer trust, and avoid legal trouble, it needs to make compliance a priority. That means regularly updating policies and making sure employees understand the importance of adhering to these standards.

Raise awareness among your customers

It’s no surprise that human error plays a huge role in SaaS cybersecurity. Gartner even predicts that by 2025, 99% of cloud security breaches will be due to customer mistakes. To help avoid these issues, it’s crucial to keep both new and existing customers updated on any system changes. They need to know how each update might impact their security and how their actions could potentially jeopardize it.

Moreover, as more companies shift to cloud-based systems, some customers might not fully understand the risks involved with that transition. That’s why you need to make sure they’re informed on how to keep their information safe and avoid security problems when dealing with your SaaS applications.

Ask the provider about certifications

One of the most important steps toward ensuring a secure SaaS environment is teaming up with the right cloud services provider. Therefore, before making a decision, it’s essential to do your research. Ask potential providers about their certifications and the standards their solutions adhere to, particularly regarding SaaS network security.

For instance, you might want to check for compliance with certificates like SOC 1, SOC 2, and ISO 27001, but also consider other relevant certifications based on your specific needs. Also, be sure to request documentation from providers to check if their solution meets your security requirements, and choose the one that offers the best value.

Improve SaaS security with NordPass

All the practices we mentioned above can be followed by using just one cybersecurity solution, NordPass. Let us prove it to you.

First, NordPass is an encrypted password management platform, which means that you and your team can use it to securely and easily generate, store, manage, and share company credentials, knowing that they are protected by advanced encryption algorithms.

Second, you can use NordPass as an identity and access management (IAM) tool, ensuring the secure provision of access to company data, services, and applications. In other words, with NordPass, you have full control over access to company resources, plus, you can monitor all company logins in real time so that you know exactly who accessed what and when.

Third, NordPass enables multi-factor authentication (MFA) and the single sign-on (SSO) method, allowing you to double-check and confirm the identity of each user whenever they attempt to access one of the company accounts.

Fourth, NordPass can play a crucial role in helping you meet regulatory compliance by adhering to some of the most essential data privacy standards, such as HIPAA. Also, you can use the platform to set up various rules, procedures, and policies in a way that will allow your organization to be in line with specific requirements.

Of course, there is a lot more to NordPass than we can discuss in just one blog post. So if you want to learn more about how it can help your organization improve its cybersecurity and productivity, make sure to visit our website or reach out to us via email: support.business@nordpass.com.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How NIST guidelines help secure BYOD in the workplace

Summary: NIST guidelines help organizations manage BYOD securely by addressing key risks and offering practical controls for mobile and personal device usage.

Today, when you rarely see someone without a mobile device in hand, the line between personal and professional devices is blurrier than ever. From checking emails to joining video calls, employees increasingly expect the freedom to use their own devices—smartphones, tablets, and laptops—to access corporate resources. This Bring Your Own Device (BYOD) trend isn’t going away anytime soon, especially with the rise of remote and hybrid work.

While a flexible device policy can boost productivity and employee satisfaction, it also introduces serious security and privacy challenges for organizations. Without proper controls, personal devices can become weak links, exposing companies to data leaks, malware, or unauthorized access.

That’s where structured guidance comes into play. The National Institute of Standards and Technology (NIST) provides a framework for securing mobile device usage in enterprise settings. In this article, we’ll explore how NIST helps businesses implement robust BYOD security practices while still balancing the flexibility modern work demands.

What is NIST, and why does it matter for BYOD

The National Institute of Standards and Technology is a U.S. government agency that develops standards to enhance innovation and security. For cybersecurity professionals, NIST is best known for its SP 800-series, a comprehensive library of documents that offer best practices and guidance on topics ranging from managing cyber risks to implementing Zero Trust architectures.

When it comes to device BYOD strategies, NIST SP 800-124 Revision 2 (Guidelines for Managing the Security of Mobile Devices in the Enterprise) is especially relevant. This document provides specific recommendations for securing both corporate and personal devices that access organizational resources.

Why is this important? Because BYOD isn’t just a convenience—it’s a strategic decision with significant security and privacy implications. Using recognized government security guidelines helps ensure your device policy is built on a solid foundation of proven, scalable practices.

Common BYOD risks in the workplace

Despite the benefits of BYOD—flexibility, cost savings, and improved user experience—it also exposes organizations to new vulnerabilities. According to research, improperly managed BYOD programs are a leading cause of corporate data breaches.

Some of the most pressing BYOD security risks include:

  • Unsecured networks: Employees often connect to public Wi-Fi, putting sensitive data at risk
  • Device loss or theft: Individual devices may lack encryption or remote wipe capabilities
  • Lack of visibility: IT teams can’t monitor every device without an endpoint management strategy
  • Malware exposure: Users might download malicious apps or fall victim to phishing schemes
  • Shadow IT: Employees may install unauthorized apps that access business data

Without controls, BYOD can quickly turn into a security blind spot. That’s why following structured guidance is essential.

Securing BYOD the NIST way: Practical safeguards that work

The federal cybersecurity framework not only outlines the problems but also provides actionable solutions. Its recommendations help mitigate BYOD security risks using layered defenses tailored to mobile and personal device usage.

BYOD + NIST security checklist

Here’s how to align your BYOD strategy with NIST SP 800-124 Rev. 2:

Device provisioning and onboarding

Before granting access, enroll personal devices into a secure environment. Provisioning includes verifying the device, applying configuration settings, and installing required security software. This baseline ensures devices meet your organization’s minimum standards before they connect to sensitive resources.

Access controls

Implement Role-Based Access Control (RBAC) so users can only access what they need. Layer in multi-factor authentication (MFA) and contextual access policies based on user location, device health, or risk score. This helps limit exposure in case of compromise.

Mobile Device Management (MDM)

Use an MDM or endpoint management platform to maintain visibility and control. Features should include pushing security updates, enforcing policies, and the ability to remotely lock or wipe compromised or lost devices.

Data encryption and remote wipe

Ensure all data—in transit and at rest—is encrypted. In case of loss or theft, remote wipe capabilities help prevent data leaks from individual devices.

App vetting and restrictions

Use application allowlisting or vetting processes to control which apps can be installed. Block access to risky third-party tools or personal cloud storage solutions that may leak corporate data.

User training and awareness

Educate employees on security risks, phishing threats, and proper usage. Secure behavior is as critical as secure technology.

Continuous monitoring and threat detection

Implement real-time monitoring for suspicious activity and enforce compliance dynamically. Continuous risk assessment and monitoring allow you to respond quickly to emerging threats.

Enterprise browser

Consider using an enterprise browser—a managed, secure browser that offers isolation from local device risks. It provides a consistent security perimeter, especially in high-risk or unmanaged environments.

 

NIST-aligned best practices to strengthen your BYOD program

Let’s break down some of the above recommendations into best practices based on trusted security benchmarks:

1. Establish a clear BYOD policy

Before launching a BYOD initiative, create a policy that outlines acceptable use, privacy expectations, and security requirements. Employees should know what’s monitored, what’s protected, and what’s off-limits.

2. Segment network access

Create separate network segments for personal and corporate devices. Limit the blast radius in case of compromise by applying Zero Trust principles.

3. Mandate security configurations

Require security settings like screen locks, disk encryption, automatic updates, and antivirus or malware protection software. MDM tools can enforce these settings across devices.

4. Leverage enterprise identity solutions

Integrate identity providers (IdPs) and context-aware authentication to maintain control over who accesses what. Tie access to risk signals and real-time analysis.

5. Monitor device compliance

Regularly audit personally owned devices for compliance. If a device is jailbroken or out of date, automatically block it from accessing company resources.

 

Why NIST BYOD strategies just work

When you align your BYOD policies with NIST, you get more than just peace of mind. You build a security framework that scales, complies, and supports business growth.

Here’s what you gain:

  • Stronger data protection: Encryption, MDM, and vetted apps minimize the chances of data breaches—even if a device is lost or stolen.
  • Simplified compliance audits: If you’re in a regulated industry (HIPAA, GDPR, PCI-DSS), NIST-aligned controls help you demonstrate proper security and privacy safeguards.
  • Remote work enablement: Employees can work from anywhere without putting your infrastructure at risk. BYOD becomes an asset—not a liability.
  • Lower security overhead: Standardizing on NIST controls reduces ad hoc fixes and cuts down on incidents and response times.

How NordLayer supports secure BYOD (and what’s coming next)

NordLayer is built to make modern work environments secure—even when employees use their own devices. Our platform helps organizations adopt BYOD without compromising visibility, control, or data security.

Here’s how we support your journey:

  • Contextual access controls: Define who gets access, from where, and under what conditions—whether it’s a laptop or a smartphone.
  • Network segmentation & traffic encryption: Isolate sensitive environments and secure connections using VPN tunnels and malware protection.
  • Easy integration with MDM and identity platforms: NordLayer integrates seamlessly with your existing stack, making it easy to enforce security rules for individual devices.

And we’re not stopping there. Soon, we’re launching NordLayer’s Enterprise Browser, designed to extend your secure perimeter to unmanaged personal devices. It offers Zero-Trust-based session control, policy enforcement, and granular visibility into browser-based activity—all without compromising the end-user experience.

In summary, BYOD doesn’t have to mean “bring your own danger.” With NIST as your compass and tools like NordLayer in your stack, you can empower remote workers, protect your data, and build a future-proof security strategy.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to view and manage saved passwords on Google Chrome

Chrome is the most popular web browser in the world. According to Statcounter, it accounts for over 65% of the market share. The reasons for its dominance range from Google’s own leading position as the world’s top search engine and the developer of Android to the Chrome browser’s built-in features like its password manager.

Such easy access to a browser-based password manager might tempt you to look into how to save and view passwords on Google Chrome. Today, we’ll explain how you can access and manage your credentials using the browser – and why it might not be so reliable at keeping your data secure.

How to view saved passwords on Chrome using a desktop device

You can use one of the three methods to view your saved passwords on Chrome. The first is the most straightforward:

  1. Launch Google Chrome.

  2. Click the three-dot icon at the top right corner of the toolbar.

  3. Under “Passwords and autofill,” select “Google Password Manager.”

  4. That’s it! You can now view all your saved passwords on Chrome.

You can also find your passwords on Chrome via the browser settings:

  1. Launch Google Chrome.

  2. Click the three-dot icon at the top right of the toolbar and  select “Settings.”

  3. Locate “Autofill and passwords” in the sidebar and select “Google Password Manager.”

  4. You can now view and access your saved passwords.

Alternatively, you can set up a shortcut to quickly access your saved passwords:

  1. Go to Google Password Manager using one of the two methods above.

  2. Select “Settings” in the sidebar.

  3. Select “Add shortcut” and install the Google Password Manager app in your browser.

  4. You can now quickly access your saved passwords via the progressive web app (PWA) on your desktop.

How to view saved passwords on the Chrome Android and iOS apps

Here’s how you can access passwords stored in Chrome on your Android or iOS device:

  1. Launch Google Chrome.

  2. Tap the three-dot icon (at the top right corner for Android or the bottom right for iOS) and select “Settings.”

  3. Tap “Password Manager.” You may be prompted to verify your identity.

  4. You can now see the full list of your saved passwords on Chrome.

How to manage your saved passwords

You can edit, import, and delete your saved passwords on Chrome using the Google Password Manager console. Let’s cover each of these processes step by step.

Editing passwords

  1. In the “Passwords” tab, select the saved item you want to edit. If you can’t find it, use the search function in the console. You may be prompted to verify your identity.

  2. Select “Edit.”

  3. You can now change the username and password and add, edit, or remove an extra note.

  4. Select “Save.”

Make sure that your new login credentials are accurate when you make changes.

Importing passwords

  1. Go to Google Password Manager’s “Settings” tab.

  2. Select “Import passwords.”

  3. Select a CSV file on your device to import.

  4. You will see a pop-up tab letting you know if the import was successful and how many passwords were imported to the browser password manager.

  5. Select “View passwords” to see which items were imported, or close the pop-up.

Chrome also lets you delete the CSV file from your device to protect your imported credentials.

Deleting passwords

To delete a password, you will follow a procedure similar to editing.

  1. In the “Passwords” tab, select the saved item you want to delete. You may be prompted to verify your identity.

  2. Select “Delete.”

  3. The password will be deleted.

You can cancel this action by clicking the temporary “Undo” button in the “Password deleted” confirmation. If you don’t take any action before the confirmation disappears, the deletion is permanent, and you can no longer restore the password.

You can also bulk-delete passwords from Chrome:

  1. In the Chrome settings, select the “Privacy and security” tab.

  2. Here, select “Delete browsing data.”

  3. In the “Advanced” tab, check the “Passwords and other sign-in data” box.

  4. Select “Delete data.”

This will permanently delete all your saved passwords, and you won’t be able to restore them.

Tips for better password management

Passwords are an inescapable part of navigating the digital world —- after all, they protect and grant access to our personal data. Juggling them all can be challenging, especially when you forget a password while rushing through your tasks. We’ve got a few tips to make password handling simpler for you:

  • Ensure all your passwords are unique. If a password you reuse is breached, all accounts protected by it can be compromised. Having one-of-a-kind passwords for each account keeps your data more secure as you browse online.

  • Create strong passwords for your accounts. We recommend all your passwords be at least 12 characters long and use a combination of letters, numbers, and special characters. Read our article with tips for setting up a strong password.

  • Update your passwords regularly. The longer you use a password, the more likely it is to eventually appear in a data leak. We recommend changing your passwords roughly every 3-6 months.

  • Set up multi-factor authentication (MFA). You can use another device to verify your login attempts. As an additional layer of security, multi-factor authentication helps ensure that your accounts remain safe even if your passwords are compromised.

  • Use a password manager. With so many accounts to manage, it’s easy to forget each unique password. Both Chrome’s built-in browser password manager and third-party tools like NordPass offer a convenient way to access your login credentials on the go without the need to memorize them all.

Is keeping passwords on Google Chrome worthwhile?

Google Password Manager is a useful solution, as far as browser-based password managers go. However, many users rely on it solely for its convenience while putting actual password security on the back burner. Compared to purpose-built password managers, a built-in browser solution actually leaves much to be desired.

Although you must verify your identity to view items stored in Google Password Manager, the verification lasts the full browser session. Google also hasn’t disclosed what encryption it uses to secure sensitive data. A password manager like NordPass encrypts your data using XChaCha20 encryption and lets you set up Autolock, ensuring you need to re-verify your identity after a set period.

All default Chrome features, including the password manager, are free. NordPass is also available for free on your device and preferred browser – Chrome included. The free version offers the essentials, like encrypted credential storage, autofill, and autosave. With NordPass Premium, you can unlock advanced features, such as Password Health, Data Breach Scanner, and Email Masking. You don’t have to compromise security for convenience – with NordPass, you get both.

 

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to lock apps on an iPhone

What’s the difference between locking and hiding an app?

The difference between locking and hiding an app is that locking leaves the icon in view but guards its contents behind Face ID, Touch ID, or a passcode, whereas hiding removes the icon altogether and places the app itself into a hidden folder protected by Face ID.

You can think of locking as putting a digital padlock on an icon that’s still visible on your home screen. Tap the icon, look at the phone, and Face ID authorizes you. Anyone who picks up your phone can see the app is installed — they just can’t access its content without your face, your fingerprint, or your device passcode.

Hiding goes one step farther — the icon disappears from the home screen, from Spotlight search, and even from the app library. The app moves to a new, Face ID-protected “Hidden” folder. In other words, locking keeps data private, while hiding keeps the entire app out of sight unless you know exactly where to look.

How to lock an app on your iPhone

  1. Touch and hold the app icon until the quick-actions menu appears.

  2. Tap “Require Face ID.” (On older hardware, the wording might differ: “Require Touch ID” or “Require passcode.”)

  3. Authenticate once. From now on, every tap brings up Face ID.

Opening a locked app

Tap the icon and look at the screen. If Stolen Device Protection is turned on and you are away from a familiar location, Face ID is mandatory — your passcode will not unlock the app.

Removing the lock

Touch and hold the icon again, choose “Don’t require Face ID,” authenticate, and the padlock disappears.

How to hide an app on your iPhone

  1. Long-press the icon, choose “Require Face ID,” and authenticate.

  2. Long-press once more, select “Hide app,” and authenticate again. The icon vanishes immediately, and the app moves to the “Hidden” folder at the bottom of the App Library.

Opening a hidden app

Swipe down on the “Home screen,” type the app’s name, select the result labelled “Hidden,” then pass the biometric prompt. The app opens but remains invisible to everyone else.

Unhiding an app

Open the “Hidden” folder, touch and hold the app, pick “Unhide,” authenticate, and the icon returns to its previous home screen spot.

 

How can you lock apps on earlier iOS versions?

If your iPhone is still on iOS 17 or below, you cannot apply the new “Lock” or “Hide” commands, but you can mimic the same protection with three built-in tools. The steps below are detailed so you can follow them without guessing.

Screen time

  1. Open “Settings” and select “Screen time.”

  2. Tap “Turn on screen time” if it is off.

  3. Choose “Use screen time passcode,” set a four-digit code, and (if offered) link it to Face ID for easier entry.

  4. Tap “App limits” and select “Add limit.”

  5. Expand a category to reveal individual apps, select the one you want to lock, and tap “Next.”

  6. Set the timer to 1 minute, then enable “Block at end of limit.”

  7. Exit “Settings.”

Guided access

  1. Navigate to “Settings” and select “Accessibility.”

  2. Tap “Guided access” and switch it on.

  3. Tap “Passcode settings” and choose “Set guided access passcode.” Select a six-digit code, and enable Face ID or Touch ID if you prefer biometrics.

  4. Open the app you plan to lock, then triple-click the side (or home) button.

  5. If the overlay appears, simply tap “Start.”

  6. To leave the pinned session, triple-click again, enter the passcode or use Face ID, and tap “End.”

Shortcuts automation

  1. Open “Shortcuts,” and go to the “Automation” tab.

  2. Tap “+,” then “Create personal automation.”

  3. Scroll down, choose “App,” and tap “Choose.”

  4. Select the target app, confirm “Is opened,” and choose “Next.”

  5. Tap “Add action,” search for “Ask for input,” and set the prompt text to “Enter passphrase.” For “Input type”, pick “Number” or “Text.”

Tips to keep apps and data secure

Relying solely on a new lock icon is insufficient. Activate Face ID or Touch ID inside every banking, health, or mail app that supports internal biometric gates. In “Notification settings,” set “Show previews” to “Never” so message content is not exposed on the lock screen. Replace six numeric digits with a longer alphanumeric device passcode. Finally, relocate every password, passkey, or credit card detail to an encrypted vault such as NordPass password manager.

Why NordPass is the essential add-on

A locked or hidden app keeps strangers from launching it, but the credentials inside can still leak in a data breach. NordPass solves that problem by encrypting every password locally before syncing. After a single Face ID check, NordPass autofills your login with a 30-character password — no need to reuse or remember anything. Passkeys created on a Mac land on your iPhone in seconds. Secure Notes protect passport numbers or alarm PINs, and the built-in Breach Scanner alerts you if any saved email address appears in a public leak. Explore the full feature list and discover what NordPass brings to the table.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×