Why you can trust ZDNET
:ZDNET independently tests and researches products to bring you our best recommendations and advice. When you buy through our links, we may earn a commission.Our process
'ZDNET Recommends': What exactly does it mean?
ZDNET's recommendations are based on many hours of testing, research, and comparison shopping. We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. And we pore over customer reviews to find out what matters to real people who already own and use the products and services we’re assessing.
When you click through from our site to a retailer and buy a product or service, we may earn affiliate commissions. This helps support our work, but does not affect what we cover or how, and it does not affect the price you pay. Neither ZDNET nor the author are compensated for these independent reviews. Indeed, we follow strict guidelines that ensure our editorial content is never influenced by advertisers.
ZDNET's editorial team writes on behalf of you, our reader. Our goal is to deliver the most accurate information and the most knowledgeable advice possible in order to help you make smarter buying decisions on tech gear and a wide array of products and services. Our editors thoroughly review and fact-check every article to ensure that our content meets the highest standards. If we have made an error or published misleading information, we will correct or clarify the article. If you see inaccuracies in our content, please report the mistake via this form.
At this point in the game, if you're not using a password manager, you run the risk of your accounts getting hacked. Why? Because without a password manager, you're probably using weak passwords that you can remember, or you're storing those passwords in an unprotected file on your computer (or worse -- on hard copy, such as a piece of paper taped to the bottom of your keyboard). Should that be the case, anyone with access to your machine (or your keyboard) would have full access to those passwords.
With a password manager in play, those passwords are encrypted and protected by a vault password. So, for anyone to view your passwords, they'd have to know your vault password first. And if you have two-factor authentication enabled on your password manager, it's even harder for someone to break in and steal those credentials.
On top of that, most password managers offer features like random password generators and auditing tools to help keep you abreast of breaches.
However, that doesn't mean you shouldn't err on the side of caution. Consider this: You've been using a password manager -- such as Bitwarden -- for years, and you've accumulated hundreds of entries.
What happens if that vault, containing all of those passwords, gets corrupted and you lose access? Before you panic, in all the years I've been using Bitwarden, my vault has never had problems. Even so, I regularly export that vault just to be sure. Should something happen to my vault on Friday, all I have to do is restore a copy from Monday, and I'm good to go.
Open the Bitwarden desktop client and type your master password. Once you've unlocked the vault, you'll have access to all of the contents within.
2. Open the Export tool
Click File > Export Vault to reveal the export pop-up.
3. Configure the export
To export, select the File Format and type your master password. Because we're exporting this to be saved in case of disaster (and because it will be used for Bitwarden if needed), we'll select the JSON format. Once you've selected the file format, type your master password again, and then click the Export button (arrow pointing downward).
4. Confirm the export
You will then be prompted to confirm the export. Click Export Vault and then select a location to house the export. I would suggest keeping the default name, as it includes the date and timestamp, so you'll know which vault is the newest, should you have to use it. Click Save and you're done.
A big caveat
The one problem with exporting your Bitwarden vault is that it's an unencrypted JSON file. That means anyone could view that file and gain access to your passwords. Because of this, I would highly recommend that you encrypt that file with a third-party tool, or at least hide it away on a flash drive and even lock it away in a safe. You do not want to leave that file lying around for anyone to see.
And that's all there is to exporting your Bitwarden vault. Should disaster strike, all you have to do is go to the Bitwarden web version, select Tools from the top navigation bar, select Import Data, select the proper file format, select Choose File, and then locate the file to import.
Do this regularly, so you always have a working copy of your Bitwarden vault.