We often read in the newspaper about a senior citizen being scammed. We also hear about this online or on the radio and TV nearly every day. The Canadian Anti-Fraud Centre reported that in 2023, there were 63,847 senior Canadians who were victims of fraud. They lost over $578 million. This is up from 2022 and up from 2021. This is not going to go down for 2024 or 2025. Fraud is the top crime perpetrated against our senior citizens in Canada now. These are only the reported cases. It is estimated that this number is much, much higher. Personal shame and embarrassment that comes with being scammed contribute to under reporting.
The Reason Seniors are Targeted
Unfortunately, there are multiple reasons why seniors are targeted by scammers. A lot of it comes from their good, trusting nature. However, age also affects our ability to think clearly in a confusing situation.
Convenience
Seniors are home during the day to answer the phone or door.
More Trustworthy
Senior citizens are known for their kind hearted and trusting nature.
Politeness
Senior citizens are usually polite, well mannered and non-confrontational
Less technological savvy
Senior citizens are usually not technologically savvy, and the world is constantly changing and how things are done are too. It is very hard to keep up even with something that used to be simple, like Online Banking.
Loneliness
Loneliness in seniors can drive them to answer unknown calls. They talk to scammers and spend time with them on the phone. Seniors can be convinced that the caller is legitimate or coerced with enough time.
Strive for Independence
Seniors often strive for independence because it provides a sense of purpose, control, and self-worth. They want to be able to make their own decisions may not seek help with presented with an problem.
Financial stability
Seniors are considered to be financially stable and having disposable income. Yet, some have no other savings or income than their pension plan. They are susceptible to finance scams or get-rich-quick scams.
Cognitive Issues
No group of people* is more susceptible to being deceived than our seniors. Scammers can easily take advantage of them. Unfortunately, this is because of age, and as we age, our mental abilities degrade. This can impair judgment and decision making abilities.
* second to seniors is actually the other end of the age scale, teens are the second age bracket most targeted and susceptible to scams.
We get an awful amount of information online that helps shapes our opinions and the decisions we make. It is important to get a good base for our opinions and decisions if we are going to be using information we find online as a source. It is important to ensure what we are reading / watching is in fact truthful. First, lets break down the difference between disinformation and misinformation
Disinformation
False information
Intended to mislead
Propaganda
Deliberately intended to mislead
Misinformation
Incorrect information
False or inaccurate
Getting the facts wrong
Identifying Disinformation
Disinformation usually tries to trigger an emotional response, usually making a bold statement on a controversial issue. We saw quite a bit of that in the last federal election, during Covid and we will continue to see it. Remember disinformation is misleading information, they are trying to trick you into believing something. Also, it is important to note that the more we see the same disinformation, the easier it is for us to accept it as truth.
Identifying Misinformation
Misinformation is incorrect information being shared. There is a difference between disinformation and misinformation, and that is that misinformation is not intentional. We did see a lot of misinformation being spread as well during the last Federal election and it was everywhere during Covid. This could be people hearing something enough, that they believed it to be true, or wanted it to be true and were sharing the information without doing or accepting the research that they did find.
Practice Makes Perfect
During Covid we saw a lot of disinformation through the Freedom Party and other right-wing groups stating that the Covid 19 pandemic was caused by a chemical weapons leak, to the vaccine containing wireless tracking chips that were implanted in everybody who got the vaccine so the government could track them. Both of these would be very hard to prove for the average person. But, it was unavoidable to not hear this information from somewhere. You either heard it on the news, or the Chief Medical Officer’s briefings, where they were reporting that the disinformation was being spread, to the lineups at the grocery store, to YouTube videos shoving the lie down your throat with every YouTube search trying to find the truth.
We have heard the saying ‘practice makes perfect’, that is the repeated effort and learning through trial and error lead to improvement and skill development. Well, if we hear the same information over and over, our brain starts to accept it. Same thing happens when you see somebody for the first time, you may not even notice them, or you may judge them unfairly. However, the more we see somebody’s face, the more used to it we become, and naturally, we start to warm up to them, gaining trust. Even if we have never spoken to that person before, if we see them everywhere, we start to ‘know’ them mentally.
Ways to Fact Check
It is up to us to do the fact checking in order to change our minds. We are unlikely, or least less likely to have our opinions changed unless we do. There are several resources to help combat disinformation and misinformation, and we really should do our due diligence before we go spreading it around.
Snopes.com
Snopes.com has been around for almost as long as the Internet. There is a good reason for that since the birth of the public Internet, everybody can have a soap box that is world reachable. Snopes is a great resource for fact checking because they back their proof with articles and examples. Every ‘fact’ that they investigate is bias free, bipartisan and fact checked with the source, scientific papers, media and other resources to collobrate the story or to debunk it. It has just over 30 years experience doing this and are the leading debunkers on the internet
Media Smarts is Canada’s Centre for Digital Media Literacy, and again has been around for just over 30 years. It started with as a child of the National Film Board of Canada and became independant in 1996. Remember the House Hippo, that was them.
It is important that you make up your own mind on what you see and hear is real, specially in today’s age. Not only by what is going on in the world today, but by all the sources of information and media we digest daily. Choosing good sources of information, that is trustworthy is key. If you are unsure, use one of the above sites to check.
Always Check Before Sharing
It is crucial that you don’t add to the problem by sharing something that you read online, or a friend has shared without doing a little bit of research first. Remember disinformation is trying to get an emotional response from you to start with, don’t let it, stop and pause and think about it. Misinformation is information spread by not knowing if it is real or not.
If Your Friend is Sharing Misinformation
We have all come across it, but how do we help correct them without them taking offense. Remember, they might not know the information that they shared is not factual. Remember though to make sure your information is before correcting somebody.
Take it to a private conversation, don’t share the correction publicly.
Provide examples of the correct information
Be polite and respectful
Here are a few great starters I have found…
“I noticed you shared this article about [topic]. I wanted to share that fact-checkers have proven it to be inaccurate. Here’s why…”
“That’s not something I’d heard before. What’s the source for that information?”
“I was curious about the thing you posted, so I did some Googling and here’s what I found…”
Scammers are always on the lookout for a fresh victim. Readily available information that people share and post online are great starts.
It is important to learn how to protect your identity online, because what you post, and what you are sharing can easily be used against you. Scammers are always on the lookout for a fresh victim and readily available information that people share and post online are great starts. This document is going to focus on Facebook, almost all social media sites will have privacy settings that you can tailor to best protect you and your identity.
Identity Theft
Identity theft is when your image or name is stolen and used by scammers. Sometimes this could be a fake Facebook profile, or worse, they start taking out loans in your name, or even take ownership of your house. There are some real horror stories out there of innocent people losing everything because the other person has more proof of their identity than the person they stole it from!
Impersonation Scams
Impersonation scams can vary from having somebody pretend to be you on Social Media, to having somebody take out loans and mortgages using your identity. This is a very scary part of our existence now and this is becoming an all too familiar scam we hear about weekly in the news. We can limit our risks by being thoughtful about what we share online and offline that can be used against us
Choosing What We Share
Always keep important documents, like birth certificates, tax documents, legal documents, deeds etc secured. Also keep your important items like credit cards, identification and Social Insurance Numbers secure. Carry only the cards you need with you on a day to day basis, keep the others locked away. These can be reissued again to an imposter, but having the originals might help you. Never give out any important information over the phone.
A lot of us like to share our images and updates on sites like Facebook and other sites. It is only natural we want to our lives with our friends and family. Sites like Facebook are great if you are far apart from your loved ones and still want to keep in touch with them. How we have our Facebook and other sites Privacy settings configured, could be letting more than just our friends and family in on our lives, we could be handing this information over to scammers to use. Against us!
When setting up any public profile, always check the privacy settings.
Depending on when you setup your Facebook account, your privacy settings might be a little more open than you’d like. By default there are a few things you can’t hide on Facebook, and that is your profile picture and your name. Those are always public.
Choosing a Safe Profile Picture
Choose a profile picture that can’t be used against you, for example, one that cannot be used to get a new ID. Make sure it isn’t just your face, and if it is, wear sunglasses, or a hat. Ideally, show you at your best, relaxing in a chair or at the beach etc.
Time For a Privacy Checkup
First, let’s confirm that we are setup to have only our friends able to see our posts and pictures.
Log in to Facebook
In the top right corner, you will see your profile picture, click on it.
Choose the menu option Settings & Privacy
Click Privacy Check up
Click Who Can See What You Share, then click Continue on the pop up
For each of the items, click the arrow on the right of the item to choose what others can see.
For most items, you have the choice between Public, Friends, Friends except…, Specific Friends, Only Me, and Custom. More most settings you want it to be Friends, not Public.
Click Done when you have made your choice
Click Next
Continue through the wizard, carefully reviewing each option.
Spear Phishing
Spear Phishing is when you are specifically targeted in a phishing scam. The scammers have done their research about you, with information they have found online about you. They might know that you like to travel, like to knit or make wooden boats. They might even know that you like certain products or follow certain brands. Scammers can even discover the names of your grandchildren because your friend list is exposed to the public on Facebook. They can use this information against you very easily. They can also find out more information about your friends and relatives and impersonate them to get to you.
One of the scariest scams going around is when scammers utilize AI to be able to mimic the voice of somebody you love, see our article here about that.
Keeping your iPad secure from viruses, malware is quite simple. Apple has a closed ecosystem that is quite secure to begin with. It is easy for them when they have 100% control over the hardware that their operating system runs on (Unlike Microsoft Windows, that has to accomodate to hundreds of PC manufacturers).
Keep your iPad Updated
Apple releases security fixes that plug the holes that the scammers are taking advantage of. I is important to keep your iPad up to date.
Here is a great video from Apple on how to update your iPad.
Use Strong Passcodes
Don’t set your passcode to your iPad to be 123456, or not have one at all. Set a secure, random passcode. Try not to use a pattern on the number pad either.
Use TouchID / FaceID
If your iPad supports it, use Touch ID and Face ID to secure the access to your iPad. Touch ID allows you to login to your iPad with a thumbprint or fingerprint – and Face ID allows you to log in with your face. Both are excellent and secure ways to securely log into your device. Both of these methods are considered Biometric Authentications. Once setup, you can even use them on some apps too, like your banking app. So, if you iPad is unlocked and somebody picks it up, they won’t be able to get into your Banking app without you.
To setup these Touch ID, open the Settings app (pictured above) Find the option called Touch ID & Passcode, then follow the onscreen instructions to enable the feature.
For Face ID, open the Settings app (pictured above). Find the option called Face ID and Passcode, then follow the onscreen instructions to enable the feature.
Secure your Apple ID
Ensure that your Apple ID is configured with a good password, see our article on Passphrases here. Also enable Multifactor Authentication (MFA) on your account, see our article on MFA here.
Download Apps Only From the App Store
The App store is heavily reviewed and vetted. Each app is thoroughly tested and it’s programming code is scrutinized before it is allowed to be added to the App Store. Apple ensures that the apps you are installing are not malicious in any way. (Another great benefit of having a closed ecosystem)
Remember the 4 P’s
Remember the 4 P’s when visiting any website, or clicking on any links. Always pause and take a moment to go through the list – that article is here if you need to know more, or for a refresher.
Ps. These same tips can be used on your iPhone too!
ClickFix attacks are a new phishing attack that actually uses your trusting nature against you to actually help the scammers do their dirty work.
Know those little boxes that pop up on websites that make us prove we are a human and not a robot? These are called Captcha boxes. And they are called that for a reason. It is actually an acronym for “Completely Automated Public Turing test to tell Computers and Humans Apart”.
How the scam works is you get a link in an email with a link. You open the link and you get a page that displays a Captcha test similar to the above. However, this one comes with some special instructions…
Here, you don’t just have to check a box, or select a bunch of the pictures that have a motorcycle in it, you are asked to do some stuff on your keyboard.
In this example they trying to get you to open a prompt on your computer that takes instructions, called the Run Command. You press CTRL+V and this pastes a command that has been put into your clipboard. Pressing Enter, actually runs the command on your computer.
So, you basically just ran a command on your computer for the scammers. What that command does is utilize a part of your system to start downloading malware from a website.
Same Thing, Different Presentation
There are multiple variations of this scam but they all pretty much act the same way. They might just start off a bit differently. Here are are samples to keep any eye out for;
You see there are multiple ways to pull of this scam. Always remember the 4 P’s when opening strange links and whenever you encounter something different.
A TOAD (Telephone-Oriented Attack Delivery) attack is a type of cyberattack where attackers use phone calls to trick victims into compromising their security or revealing sensitive information, often in conjunction with initial phishing emails or texts. These attacks leverage the trust people often place in strangers who call and claim authority.
Here is how it plays out;
You get text messages or emails pretending to be a legit organization. Often containing a fake invoice or alerts about your accounts
The message directs you to call a number for assistance.
When you get the scammer on the phone – you get connected to a fake call centre. The scammer then tells you to install software on your computer, or tricks you into providing personal information.
Now that you have installed the software – they can now get access to your computer. Leading to various threats like taking your data, ransomware or further attacks. If they get your personal information, they can use it to perform other acts as you. Like logging into your bank account.
TOAD attacks are very sophisticated attacks that use multiple means of communication to compromise you or your information. This isn’t just a link that you click on in an email. It is a multifaceted attack, highly coordinated attack that involves emails, texts, phone calls. Combined to get you to provide personal information, or install malicious software on your computer.
Always use caution, and remember the 4 P’s. Scams can come in many forms, and not just by clicking a link on a website, or in an email.
“the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.” – Oxford Dictionary
Phishing scams are normally done through emails. If it is via Text Message, they have a name for that, called Smishing short for SMSPhishing. And if it is via Telephone, they call that Vishing, for voice phishing.
Phishing Scams
These are the emails that are trying to trick you into giving up your personal information, like login credentials, credit card number or bank account information. They usually come in the form of a message from a trusted service, like your bank, or other service you might use, or possibly warning you of a problem with your computer. Either way, they are all tricks. Lets get into them.
Let’s say you get an email that has the following message with in it
First reaction, you would panic, right?! You need access to your money – and this was probably sent Saturday afternoon, right after the banks closed for the weekend – what are you going to do?
1. Stop, Pause and Think
Well, before we click on that button, lets remember the 4P’s of Fraud and take a pause.
They are Pretending to be from TD Bank, they introduce a Problem with your account, they Pressure you to act immediately and validate your account, and you will Pay if you click that link.
The 4 P’s will help you before you click on any links or buttons in the email. Stop and think of the 4 P’s for every email you get, especially if you want to react immediately.
2. What Other Clues Do We Have?
Once you have paused for a minute start taking a look around
Who Sent It?
Take a look at the four samples below…The From Field can show just the sender’s name or the email address, or both. You need to pay attention here.
a)
b)
c)
d)
Look at the first line in each example, these are all examples of how the email can be shown in your email viewer. Looking at a), it just shows TD Canada Trust, with no actual email address, if you happened to mouse over that field, it will show you the email address it really sent with.
Looking at b), here we see TD Canada Trust, with an email address in brackets, this is the real email address it sent with. Think TD would email you from a gmail.com account?
Looking at c), this one shows [email protected] in the From field, followed by that gmail account again in brackets. Here they are trying to trick you by putting in a real email address in the From name part of the From field.
Now, for d) this one just shows the email address, but it is actually the name portion that is displaying, mousing over the From field, will display it’s real email address.
Easy To Be Fooled Isn’t It?
As you can see, it is tricky how they manipulate the system isn’t it. You probably won’t think twice for a) and d), they both look legit at first glance, the others you might be able to catch, but with a little practice you will.
Email clients have been training us wrong all these years, if you look at your inbox now, with all the emails you have received, you probably only see the names listed.
So the first thing you see is an email from TD Canada Trust in your inbox, with the subject with one of those big red exclamation points beside it indicating something is wrong and you need to take a look immediately. Right off the bat, you are on guard and ready to resolve whatever the issue might be.
3. Where Do the Links Take You?
Next we check in the body of the email, hover over any links or buttons. You should see a pop up showing you where it is going to take you.
Now, that doesn’t look like the site you normally go to right? Well, let’s just peak behind the curtain of that site and see what would have happened, if you did click on it.
It takes you to a site that looks just like TD Bank’s Login page. An exact replica! Look at the address bar, that isn’t TD.
What this is, is a fake landing page. They do a masterful job of mimicking the real sites, you can even use all the other links, they take you to the right place, on the real site, but that Username or Access Card and Password field, they don’t go to TD Bank. You enter your details and click enter or press the Submit button. You get a message that the login failed. In the meantime, you are then redirected to the real TD Bank website and get the exact same login page again. This time you can login in just fine.
The Scammers Have What They Wanted
When you logged into the site via the scammers fake site, you handed over your login details to your bank to the bad guys. The site then refreshed, and you ended up on the real site, a real switcharoo just happened right before your eyes. You might think at this point that something smells fishy (phishy), but you look up at the address bar, and you see https://authentication.td.com/, the real site. And you might think you were being over cautious for a reason.
The Best Course Of Action
Think of the 4 P’s.
Always verify who the sender is.
Never click on links or buttons in emails without first pausing and hover over the link to see where you are going first. Or, just don’t click on links or buttons in emails period.
If you are unsure and want to verify, don’t click any links or buttons in emails. Always login to the site the way you normally do, via the bank’s real website.
Remember these emails can come from anybody and have any sort of message within that is trying to get a reaction out of you without thinking first. It might be from the bank, like our example, but it can pretend to be from Canada Services, Canada Revenue Agency, from Netflix, from anywhere…. you can never tell. If they are telling you there is a problem, or that you have to update your billing details, or you just need to confirm something, anything that smells, well, phishy, pause, and take a few moments for your safety.
We definitely know the pain of visiting a website or trying to read an article and every few lines is an advertisement. It is frustrating and can be even hard to navigate with all the clutter. There is something you can do though, and that is by adding an Ad Blocker to your web browser.
Ad Blockers have been around for almost as long as the Internet itself, and while some might have changed in the background, they typically block ads, and do it well.
What Do Ad Blockers Do?
Ad Blockers offer the following benefits, to also just blocking ads
Speed up web browing
Improve your browsing experience
Enhanced Privacy
Protection from Malvertising (that is where you get malware or phishing attempts from just visiting a site)
Control over the online experience
You can allow ads on some sites, while blocking all others. You can also allow ads just for the short time you are on the site, and block it again right after.
How Can I Tailor My Ad Blocker To My Needs?
When you install and Ad Blocker it will block most of the ads. The pages look so much cleaner and less cluttered. Some ads will still be displayed though, these are not typically served up ads. These are ads that are hard coded into the website. They aren’t overly common, but you will still see some ads. . But, some sites do have a problem with them and will force you to disable them (typically journalism websites).
There are other times where I appreciate the site and the content they provide. I also understand that they make money from the advertisers based on how often that the ad is shown. I will enable ads on those sites. It is a toss up though, and you can make that decision when you come to it.
Different Ad Blockers
Please note, that AdblockPlus and AdBlock are two different companies and not different versions.
Each of the above are really good and top of their game.
They all have the same features and all are free for the basic purpose of blocking ads, but offer premium, subscription based versions for more features like blocking Cookie pop up messages. uBlock Origin is the only one that doesn’t have a paid version and is, what is called Open Source and is 100% free.
I personally have been using AdblockPlus free edition and have been very happy with it.
Installing An Ad Blocker In Your Browser
Click on the link for the desired Ad Blocker above, it will take you to the installer page. For AdBlock you will need to click the big red button in the middle of the page labelled ‘Get AdBlock Now’ It will detect the browser you are using an take you to the appropriate web store.
How To Use It
By default, it will try to block all ads on all sites, but as mentioned there will be times you want to disable it for a particular site, Find the icon for the Ad Blocker either in the top of your browser or in your Extensions which can always be found in the settings icon in the top right corner typically in all browsers, it might look like a hamburger with 3 horizontal lines on top of each other, or a string of dots. Click that and you will see Extensions listed. Find your ad blocker and choose your settings for that site. For AdblockPlus below, you move the slider to off for this website, and allow it to refresh the page, or refresh it on your own to have change take effect.
Do you have a favourite ad blocker? Tell us in the comments!
This one is a bit long, but worth it. I recommend you read until the end so you can find out why these cookies are important and how you are being tracked and having tailored ads shown to you.
Have you noticed over the last few years, every site is now showing you a little pop up banner about cookies? Well, they added a privacy law in Europe in 2018 (article on Wikipedia about that), that demands that any site shown to a European must disclose how they are using cookies on their website, and since Europeans visit websites all over the world, the rest of the world complied.
And they are not even the delicious cookies you can eat. Nope, in computer lingo, a cookie (aka web cookie, Internet cookie, browser cookie) is a little tracking document that is stored on your computer or device.
Cookies allow websites to store useful information on your computer instead of having to store on their site. For example, you go to a website that sells these cool handtowels, and you add a few items to a shopping cart. You decide to think about it for a while and close the window. A month goes by and you go back to the site, and your items are still in your cart waiting for you. That is how that happens.
Some will store authentication cookies, they allow you to visit multiple pages of a website without having to log in each time.
Tracking cookies, are used to track what websites you have been to and are put there by the advertisers on the webpages you go to. They are given permission to that one advertiser to store and read the file on your computer. Remember that hand towel site you were on earlier, as you browse the internet, you will start to notice ads for hand towels. That is how that works!
These Tracking cookies are also called Third Party Cookies.
What To Do When You See A Cookie Banner
You usually, have 3 options,
Accept
Reject
Customize / Manage My Preferences (this can vary from site to site, but you get the idea)
If you Accept, you are allowing that website and its content to create little files on your computer to store information about you. Remember, this can be useful, for remembering items in your shopping cart, preferences you have setup for the website, or even where you left off when reading a long article.
If you Reject, you lose the above functionality, but are also not going to get tracked.
If you Customize, you can choose what you want tracked and not tracked. Let’s look at a sample I gathered from an website that shall not be named, but it is a famous Canadian brand.
Strictly Necessary Cookies
Here we see, that there are Strictly Necessary Cookies, that we can’t disable, but, we have the option to click the + beside it see what it will be storing. In this sites case, they state that these cookies are necessary for the website to function and if you disable some of these features in your browser, some parts of the website will not work.
Performance Cookies
These cookies allow them to count visits and traffic sources so they can measure and improve the performance of the site. They help them know which pages are more popular and which ones are not. They go on to state that this information is Anonymously gathered. You can turn this one off, but they won’t be able to know you visited the site
Functional Cookies
These cookies allow the site to provide enhanced functionality and personalisation. If you do not allow these cookies, some features may not work correctly. These ones sound like the ones that are tracking what is in your basket, what coupon codes you have loaded etc, even your shipping destination and email address info (without creating an account).
Social MediaCookies
These cookies are set by a range of social media services that they added to the site to enable you to share content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests.
Targeting Cookies
These cookies may be set through the site advertising partners. They may be used to build a profile of your interests and show you relevant adverts on other sites. They don’t store personal information but identify you by your browser and device.
Choices, Choices, Choices….
Looking at the above options, it is proof that you should read what that cookie banner is telling you and not to blindly ‘Accept All’. There is proof in those descriptions that social media companies and advertisers can track you if you don’t choose to disable these options.
It is totally up to you how you want that site to use your information. Do you want it being shared with third parties that you have no control over and they are using that information against you by serving up ads targeting and tailoring just for you? You can get by with ‘Accepting All’ each time you go to a new site, but be aware that the websites you visit are being recorded and shared, or, you can tailor it to best suit your needs. Keep the necessary tracking cookies enabled, but turn off the Social Media and Targeting cookies.
You typically only have to do this once, the first time you visit the site.
Password managers are apps that keep your passwords all in one place, securely. They allow you to manage, store and utilize strong unique passwords for each site or service you log in to.
You can store your own passwords in the password manager or have the password manager generate a new password for you. They usually generate 20+ character passwords made up of random strings, so complex, that it is not worth the effort to even try to remember them
When you have a password stored in a password manager, you use the app to provide the password to the website / service you are trying to log into. You can install the app on your Windows or MacOS device, or on your IOS or Android device. You can even install it directly into your browser as an add on. When you go to a website to log in, you open the app and it provides all the information.
Your passwords are securely stored and are locked behind a secret key and a secure password you use to log into your password manager.
Password Managers offer the following bonuses
Let you know if your password is insecure
Let you know if your password was included in a known data breach
Lets you know if you are using the same password on multiple sites.
Can be used over multiple devices, so you always have your passwords on your phone, your tablet and your laptop or desktop computer
You can choose to ‘Remember Me’ on secure devices like your phone or laptop if you never leave it unattended, so you don’t have to log in each time, but it should prompt you every now and then for security reasons so don’t forget the master password you set.
One Password to Rule Them All, One Password to Find them….
The best part of using a password manager is that you only need to remember one password and that is the master password to your password manager. Make sure it is a secure one by using a passphrase.
Don’t store passwords for sensitive accounts, such as banking or email accounts
Don’t reuse the password you used for the master password
Don’t share your master password
Options for Password managers, though some are free with very limited features, most are around $40 a year with subscription. It is a small price to pay for added security, and always having a unique, secure password recorded and stored for you is a huge bonus!