Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Better Update Your Microsoft Password Today

You Better Update Your Microsoft Password Today

While we would strongly recommend that you update your passwords more than once a year, now is as good a time as any to do so. Reflecting on this, let’s go over how to fully lock down your Microsoft accounts.

We should start with a bit of a warning. In December, a massive cybersecurity attack targeted the US government via (along with other tools) Microsoft Office. As it was revealed, foreign hackers were monitoring the US Treasury Department and the National Telecommunications and Information Administration through their email accounts.

While Microsoft hasn’t identified any specific vulnerabilities within their cloud services or applications (a good sign, for certain), they have shared some practices to help users properly and comprehensively secure their data. These practices are important to keep in mind for both your personal and business accounts.

What is Included in a Microsoft Account?

Your Microsoft account will include many programs under its purview… basically, anything that Microsoft contributes to will be tied to this account, including:

  • Windows
  • Outlook
  • Office
  • Skype
  • OneDrive
  • Xbox Live
  • Bing
  • Microsoft Store
  • MSN

How to Update Your Microsoft Account Password

Microsoft has made the process somewhat simple and straightforward.

  • Visit https://account.microsoft.com/
  • Click Sign In on the top right if you aren’t already signed in. If you are already signed in, the page will display your name with options about your subscriptions and other services. Once you sign in with your email and password, you’ll be taken to this page.
  • Towards the top of the page, on the right-hand side, you’ll see an option that says Change Password. Click it.
  • If you have Two-step verification enabled, it will walk you through verifying your account with a text, an email, or using the Microsoft Authenticator app. If you don’t have that set up, don’t worry, we’re going to get you set up after you change your password.
  • Once prompted, enter your current password, and then come up with a brand-new password.

An important consideration: You need to make sure that every password you create abides by certain best practices, like not being used for more than one account and involving no personal details or identifiable information. If pressed, select four random and unrelated words, switch up some of the capitalization, and substitute numbers and symbols for some letters—the more complicated, the better.

Helpfully, Microsoft has included a feature that will require a password change every 72 days. While this sounds like a pain to deal with, it can help reduce the chance of your password being breached and therefore can keep your account more secure.

Additional Security Features

While we’re changing your password, let’s go ahead and add another layer to your security in the form of Two-Step Verification. Setting this up will require you to provide proof of your authenticity beyond just having the right username and password. Work accounts may need administrator permissions to activate it, but it is worth doing.

Once you change your password, you should be directed to Microsoft’s account security page, where you will find the option to activate two-step verification. You’ll be walked through the process via on-screen instructions that will tell you how to link an authenticator application on your smartphone (like Google Authenticator, LastPass Authenticator, Duo Mobile, and other examples). If you don’t have one, you’ll be instructed how to set up Microsoft Authenticator, or you can opt in to one of these other options.

You’ll be taken through the setup process and asked to verify your contact information.

From that point forward, you’ll need to use your authentication app to log into your Microsoft account on a new device, or anytime you want to make changes like updating your password. You’ll be able to use other programs, like Word or Outlook, as normal. Make sure that you keep an eye on your emails and text messages for any Microsoft may send you.

This process can take mere minutes but deliver lasting benefits to your security. For more assistance with locking down your work accounts, or any other of your IT needs, make sure you reach out to Total Tech Care by calling 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Phishing Windows Managed IT Services Upgrade Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Office Server Save Money Data Recovery Passwords Windows 10 Virtualization Gadgets Tech Term Saving Money Holiday Chrome Social Media Managed IT Services Managed Service Automation Microsoft Office Cybercrime Computers Artificial Intelligence Operating System Facebook Health Internet of Things BYOD Mobile Device Management Wi-Fi Networking IT Support Hacking Alert Spam Office 365 Remote Telephone Systems Managed Service Provider Information Technology Covid-19 Information BDR Bandwidth Social Engineering Mobility Router Recovery Employer-Employee Relationship Law Enforcement Human Resources Mobile Computing Application Remote Monitoring Password Money Data Breach Encryption App History Big Data Applications Private Cloud Remote Computing Data Storage Patch Management Managed IT Mobile Office Apps Office Tips Training Blockchain Paperless Office VPN How To Government Marketing WiFi Two-factor Authentication Infrastructure IT solutions Voice over Internet Protocol Entertainment Website Mouse Budget Vulnerability HaaS Windows 7 Bring Your Own Device Data Management Word Work/Life Balance Servers Wireless Google Drive Data Security Gmail Settings Avoiding Downtime Flexibility Employee/Employer Relationship RMM Virtual Reality Apple Save Time Social Conferencing USB Scam User Error Cleaning Meetings Data Protection Vendor Management End of Support Risk Management Hacker Physical Security Education Safety The Internet of Things HIPAA Lithium-ion battery Sports Vendor Redundancy Managed Services Keyboard Telephone System Staff Software as a Service Display Machine Learning Firewall Remote Work Connectivity Hard Drive Google Docs SaaS Hiring/Firing Identity Theft Document Management Printer Solid State Drive Wireless Technology Computing Bluetooth How to Downtime Network Congestion Augmented Reality eWaste Fraud Data storage Business Intelligence Automobile Digital Signage Remote Worker Audit IT Consultant Worker Computing Infrastructure IT Management Cryptocurrency Going Green Wearable Technology Humor Retail Hard Drives Botnet IT Plan Procurement Instant Messaging Comparison Net Neutrality Robot Excel Workplace Strategy Battery Unsupported Software Shadow IT CES Help Desk Biometrics Virtual Desktop Legal Printing Charger Business Technology Internet Exlporer Content Management Compliance Access Control DDoS OneNote Computer Care Managed Services Provider PDF Virtual Assistant Current Events SharePoint Database Telephony Authentication Samsung Proactive IT Remote Workers Virus Customer Service Best Practice Value Processor Unified Threat Management Environment YouTube Update Computer Accessories Electronic Medical Records Fax Server Black Market Spam Blocking Screen Mirroring HVAC Peripheral Loyalty Google Apps IT service Business Owner Frequently Asked Questions Digital Security Cameras NarrowBand Analysis Using Data Books Cameras 5G Tablet Search Mobile Administrator Windows 10s Devices Copiers iPhone Cast Enterprise Content Management Quick Tip Domains Tip of the week MSP Ergonomics webinar Accountants Emergency Smartwatch IaaS Employer Employee Relationship Credit Cards OLED Maintenance Professional Services Microchip Public Cloud Thought Leadership Development Files Password Management PCI DSS Assessment Password Manager Virtual Machine Bloatware Printer Server Windows Server 2008 2FA Chromecast Fiber Optics Multi-Factor Security Employee Twitter Messaging Cabling Tablets Tools Search Engine Colocation NIST Policy Uninterrupted Power Supply Television Business Mangement Hypervisor Entrepreneur Trending Dark mode Smart Tech Trend Micro Addiction SMS Amazon Default App Shortcut Monitor Procedure Public Computer Recycling Saving Time Cost Management Transportation Google Search Social Networking Regulations Wiring dark theme Practices Shopping Reputation Computer Fan Cache AI Streaming Media Rootkit Amazon Web Services IT Infrastructure Content Safe Mode FinTech Tech Support Criminal Bing Benefits Techology GDPR Laptop Workers Hosted Computing Social Network Running Cable Customers FENG Wireless Internet Online Shopping Investment Memory Audiobook File Sharing Employees IBM Employee/Employer Relationships Consultant Smart Technology Specifications ISP Analytics Flash Camera Windows 365 Touchpad Inventory Wire Video Conferencing Evernote ROI Politics Advertising Software Tips Sales Supercomputer Bitcoin Best Available Travel Shortcuts Millennials Cryptomining Science Sync Printers Point of Sale Emails Personal WIndows 7 Smart Office Supply Chain Management Notifications Wireless Charging Monitoring Batteries Distributed Denial of Service Two Factor Authentication Workforce Customer Relationship Management Virtual Private Network Windows 8.1 Netflix Digitize Relocation Root Cause Analysis Cables Windows Server 2008 R2 Analyitcs Programming HBO Customer relationships Knowledge Music Telecommuting Manufacturing PowerPoint Windows Media Player Video Games Skype Project Management Email Best Practices Nanotechnology IT Assessment User Data loss Cortana Worker Commute Experience Outlook Computer Tips Leadership Digital Signature Managed IT Service Antivirus Troubleshooting Security Cameras Biometric Security Windows 8 Scalability Start Menu Warranty Virtual CIO OneDrive Managing Stress

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code