Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Better Update Your Microsoft Password Today

You Better Update Your Microsoft Password Today

While we would strongly recommend that you update your passwords more than once a year, now is as good a time as any to do so. Reflecting on this, let’s go over how to fully lock down your Microsoft accounts.

We should start with a bit of a warning. In December, a massive cybersecurity attack targeted the US government via (along with other tools) Microsoft Office. As it was revealed, foreign hackers were monitoring the US Treasury Department and the National Telecommunications and Information Administration through their email accounts.

While Microsoft hasn’t identified any specific vulnerabilities within their cloud services or applications (a good sign, for certain), they have shared some practices to help users properly and comprehensively secure their data. These practices are important to keep in mind for both your personal and business accounts.

What is Included in a Microsoft Account?

Your Microsoft account will include many programs under its purview… basically, anything that Microsoft contributes to will be tied to this account, including:

  • Windows
  • Outlook
  • Office
  • Skype
  • OneDrive
  • Xbox Live
  • Bing
  • Microsoft Store
  • MSN

How to Update Your Microsoft Account Password

Microsoft has made the process somewhat simple and straightforward.

  • Visit https://account.microsoft.com/
  • Click Sign In on the top right if you aren’t already signed in. If you are already signed in, the page will display your name with options about your subscriptions and other services. Once you sign in with your email and password, you’ll be taken to this page.
  • Towards the top of the page, on the right-hand side, you’ll see an option that says Change Password. Click it.
  • If you have Two-step verification enabled, it will walk you through verifying your account with a text, an email, or using the Microsoft Authenticator app. If you don’t have that set up, don’t worry, we’re going to get you set up after you change your password.
  • Once prompted, enter your current password, and then come up with a brand-new password.

An important consideration: You need to make sure that every password you create abides by certain best practices, like not being used for more than one account and involving no personal details or identifiable information. If pressed, select four random and unrelated words, switch up some of the capitalization, and substitute numbers and symbols for some letters—the more complicated, the better.

Helpfully, Microsoft has included a feature that will require a password change every 72 days. While this sounds like a pain to deal with, it can help reduce the chance of your password being breached and therefore can keep your account more secure.

Additional Security Features

While we’re changing your password, let’s go ahead and add another layer to your security in the form of Two-Step Verification. Setting this up will require you to provide proof of your authenticity beyond just having the right username and password. Work accounts may need administrator permissions to activate it, but it is worth doing.

Once you change your password, you should be directed to Microsoft’s account security page, where you will find the option to activate two-step verification. You’ll be walked through the process via on-screen instructions that will tell you how to link an authenticator application on your smartphone (like Google Authenticator, LastPass Authenticator, Duo Mobile, and other examples). If you don’t have one, you’ll be instructed how to set up Microsoft Authenticator, or you can opt in to one of these other options.

You’ll be taken through the setup process and asked to verify your contact information.

From that point forward, you’ll need to use your authentication app to log into your Microsoft account on a new device, or anytime you want to make changes like updating your password. You’ll be able to use other programs, like Word or Outlook, as normal. Make sure that you keep an eye on your emails and text messages for any Microsoft may send you.

This process can take mere minutes but deliver lasting benefits to your security. For more assistance with locking down your work accounts, or any other of your IT needs, make sure you reach out to Total Tech Care by calling 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Managed IT Services Windows Upgrade Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Cloud Computing Office Data Recovery Passwords Windows 10 Gadgets Chrome Tech Term Virtualization Social Media Saving Money Holiday Managed Service Microsoft Office Automation Managed IT Services Operating System Artificial Intelligence Facebook Computers Cybercrime Hacking Wi-Fi BYOD Health Mobile Device Management Networking Internet of Things IT Support Spam Managed Service Provider Information Alert Office 365 Telephone Systems Remote Information Technology Covid-19 Social Engineering Mobility Recovery Employer-Employee Relationship Router Bandwidth BDR Remote Monitoring Big Data Password App History Money Encryption Mobile Computing Applications Data Breach Application Human Resources Law Enforcement How To Managed IT Apps Office Tips Data Storage Training Patch Management VPN Government Remote Computing Blockchain Paperless Office Mobile Office Private Cloud Bring Your Own Device Infrastructure Data Management Voice over Internet Protocol Work/Life Balance Wireless Flexibility Marketing Vulnerability WiFi Windows 7 Gmail Word IT solutions Entertainment Google Drive Settings Website Budget Servers Two-factor Authentication Avoiding Downtime Mouse Data Security HaaS User Error Machine Learning Meetings Save Time Connectivity Remote Work Risk Management Cleaning Hacker The Internet of Things Conferencing Lithium-ion battery End of Support Vendor Education Physical Security Scam Data Protection Safety Managed Services Display Sports HIPAA Firewall Redundancy USB Vendor Management Keyboard Virtual Reality Employee/Employer Relationship Apple RMM Social Software as a Service Telephone System Staff Solid State Drive Wireless Technology Samsung How to Downtime Update Digital Signage Wearable Technology Value Hard Drives Data storage Retail Electronic Medical Records Google Docs Instant Messaging Automobile Spam Blocking Identity Theft Robot Excel Procurement Hiring/Firing Biometrics Net Neutrality Computing Infrastructure Workplace Strategy Virus Going Green Virtual Desktop Help Desk Printing Augmented Reality Unified Threat Management Computer Accessories DDoS Fraud Battery SharePoint Shadow IT Remote Worker Legal Business Intelligence Managed Services Provider Cryptocurrency Internet Exlporer Worker Database Audit Printer IT Management Customer Service Bluetooth Environment Remote Workers Comparison Botnet PDF IT Plan Fax Server Processor CES Proactive IT Unsupported Software SaaS Hard Drive IT Consultant Business Technology Content Management Best Practice Access Control YouTube Charger Black Market Compliance Computing Humor Virtual Assistant Network Congestion OneNote Authentication eWaste Computer Care Current Events Document Management Telephony Root Cause Analysis Nanotechnology Messaging Telecommuting Cabling Consultant Project Management Analytics HBO Knowledge Policy Cortana Shortcut Music Hypervisor Trend Micro Cost Management Skype Files Dark mode Digital Signature Data loss Chromecast SMS Social Networking Default App Best Available Warranty WIndows 7 Outlook HVAC Leadership Procedure Google Apps Troubleshooting Saving Time Uninterrupted Power Supply Shopping Google Search Start Menu Colocation dark theme Analysis Screen Mirroring Devices Running Cable Loyalty AI IT Infrastructure Administrator Memory Bing Frequently Asked Questions Enterprise Content Management Monitor FinTech Books Social Network Mobile MSP Windows 10s Accountants Microchip Cast Thought Leadership Credit Cards Investment User PowerPoint Tip of the week Password Management Windows Media Player Reputation webinar Employees Password Manager Streaming Media Emergency Employee/Employer Relationships Tech Support Employer Employee Relationship Multi-Factor Security ISP Content Professional Services Public Cloud Windows 365 Search Engine Techology Twitter Laptop Assessment Video Conferencing ROI Science Managing Stress Shortcuts Windows Server 2008 NIST Customers Sales Business Mangement Bitcoin Smart Tech Personal Trending Cryptomining Audiobook Tools Point of Sale Cameras Addiction Distributed Denial of Service Touchpad Television Supply Chain Management Amazon Customer Relationship Management Analyitcs Monitoring Recycling Batteries Practices Digitize Programming Politics Wiring Advertising Windows 8.1 Cache Public Computer Amazon Web Services Windows Server 2008 R2 Regulations Safe Mode Customer relationships Criminal Notifications Transportation Computer Fan Email Best Practices Hosted Computing Antivirus Rootkit IT Assessment Manufacturing GDPR Printer Server Wireless Internet Online Shopping Windows 8 Benefits Managed IT Service Security Cameras File Sharing Relocation Workers Computer Tips IT service FENG Virtual CIO Inventory OneDrive Specifications Biometric Security Camera Video Games Wire IBM Peripheral Evernote Tablet Smart Technology Using Data Travel Worker Commute Flash Digital Security Cameras Domains Copiers Millennials 5G Experience Printers Scalability Software Tips Smart Office IaaS Supercomputer Quick Tip Wireless Charging Maintenance Bloatware Smartwatch Business Owner Sync Emails Ergonomics NarrowBand Development Workforce OLED Virtual Private Network Search PCI DSS Cables Virtual Machine Tablets Two Factor Authentication Fiber Optics Entrepreneur Employee iPhone Netflix 2FA

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code