Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Better Update Your Microsoft Password Today

You Better Update Your Microsoft Password Today

While we would strongly recommend that you update your passwords more than once a year, now is as good a time as any to do so. Reflecting on this, let’s go over how to fully lock down your Microsoft accounts.

We should start with a bit of a warning. In December, a massive cybersecurity attack targeted the US government via (along with other tools) Microsoft Office. As it was revealed, foreign hackers were monitoring the US Treasury Department and the National Telecommunications and Information Administration through their email accounts.

While Microsoft hasn’t identified any specific vulnerabilities within their cloud services or applications (a good sign, for certain), they have shared some practices to help users properly and comprehensively secure their data. These practices are important to keep in mind for both your personal and business accounts.

What is Included in a Microsoft Account?

Your Microsoft account will include many programs under its purview… basically, anything that Microsoft contributes to will be tied to this account, including:

  • Windows
  • Outlook
  • Office
  • Skype
  • OneDrive
  • Xbox Live
  • Bing
  • Microsoft Store
  • MSN

How to Update Your Microsoft Account Password

Microsoft has made the process somewhat simple and straightforward.

  • Visit https://account.microsoft.com/
  • Click Sign In on the top right if you aren’t already signed in. If you are already signed in, the page will display your name with options about your subscriptions and other services. Once you sign in with your email and password, you’ll be taken to this page.
  • Towards the top of the page, on the right-hand side, you’ll see an option that says Change Password. Click it.
  • If you have Two-step verification enabled, it will walk you through verifying your account with a text, an email, or using the Microsoft Authenticator app. If you don’t have that set up, don’t worry, we’re going to get you set up after you change your password.
  • Once prompted, enter your current password, and then come up with a brand-new password.

An important consideration: You need to make sure that every password you create abides by certain best practices, like not being used for more than one account and involving no personal details or identifiable information. If pressed, select four random and unrelated words, switch up some of the capitalization, and substitute numbers and symbols for some letters—the more complicated, the better.

Helpfully, Microsoft has included a feature that will require a password change every 72 days. While this sounds like a pain to deal with, it can help reduce the chance of your password being breached and therefore can keep your account more secure.

Additional Security Features

While we’re changing your password, let’s go ahead and add another layer to your security in the form of Two-Step Verification. Setting this up will require you to provide proof of your authenticity beyond just having the right username and password. Work accounts may need administrator permissions to activate it, but it is worth doing.

Once you change your password, you should be directed to Microsoft’s account security page, where you will find the option to activate two-step verification. You’ll be walked through the process via on-screen instructions that will tell you how to link an authenticator application on your smartphone (like Google Authenticator, LastPass Authenticator, Duo Mobile, and other examples). If you don’t have one, you’ll be instructed how to set up Microsoft Authenticator, or you can opt in to one of these other options.

You’ll be taken through the setup process and asked to verify your contact information.

From that point forward, you’ll need to use your authentication app to log into your Microsoft account on a new device, or anytime you want to make changes like updating your password. You’ll be able to use other programs, like Word or Outlook, as normal. Make sure that you keep an eye on your emails and text messages for any Microsoft may send you.

This process can take mere minutes but deliver lasting benefits to your security. For more assistance with locking down your work accounts, or any other of your IT needs, make sure you reach out to Total Tech Care by calling 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Communication Business Continuity IT Support Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Office Data Recovery Cloud Computing Server Save Money Windows 10 Passwords Chrome Virtualization Social Media Saving Money Holiday Gadgets Tech Term Automation Managed IT Services Managed Service Microsoft Office Artificial Intelligence Facebook Computers Cybercrime Operating System Wi-Fi Health BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Information Technology Remote Spam Information Covid-19 Managed Service Provider Office 365 Alert Telephone Systems Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Mobility App History Data Breach Password Money Mobile Computing Encryption Human Resources Applications Application Law Enforcement Remote Monitoring Big Data Office Tips Training Apps VPN How To Remote Computing Blockchain Paperless Office Government Mobile Office Data Storage Patch Management Private Cloud Managed IT Bring Your Own Device Data Management Wireless Servers Work/Life Balance Flexibility Gmail Marketing WiFi Settings IT solutions Data Security Entertainment Website Google Drive Budget Two-factor Authentication Mouse HaaS Avoiding Downtime Vulnerability Infrastructure Voice over Internet Protocol Windows 7 Word Cleaning Vendor Management The Internet of Things Lithium-ion battery Data Protection End of Support Education Physical Security Firewall Safety HIPAA USB Sports Redundancy Virtual Reality Apple Keyboard Vendor Software as a Service Social Telephone System Staff Managed Services Machine Learning Display User Error Connectivity Remote Work Meetings Conferencing Employee/Employer Relationship Scam Save Time RMM Risk Management Hacker Fraud Botnet Virus IT Plan DDoS Computing Infrastructure Remote Worker Going Green Unified Threat Management Computer Accessories Unsupported Software Cryptocurrency Digital Signage SharePoint Charger Battery Compliance Comparison Customer Service Shadow IT OneNote Procurement Legal Computer Care Environment Printer Workplace Strategy Current Events CES Net Neutrality Bluetooth Fax Server Internet Exlporer Telephony Samsung Help Desk Business Technology Printing Content Management Access Control SaaS PDF Value Virtual Assistant Spam Blocking Authentication Managed Services Provider Electronic Medical Records IT Consultant Proactive IT Network Congestion eWaste Best Practice Database Hiring/Firing YouTube Humor Remote Workers Black Market Update Processor Wearable Technology Google Docs Document Management Hard Drive Solid State Drive Identity Theft Retail Wireless Technology Hard Drives Instant Messaging Business Intelligence How to Downtime Robot Excel Audit Worker Biometrics IT Management Computing Data storage Virtual Desktop Augmented Reality Automobile Search Engine PCI DSS Computer Fan Twitter Virtual Machine Rootkit 2FA NIST Fiber Optics Business Mangement Employee Monitor Smart Tech Cabling Benefits User Trending PowerPoint Science Windows Media Player Messaging Workers Policy FENG Addiction Hypervisor Amazon Streaming Media Dark mode Trend Micro IBM Recycling Reputation Practices Default App Distributed Denial of Service Smart Technology Managing Stress Customer Relationship Management Tech Support Flash Wiring SMS Content Procedure Cache Saving Time Techology Amazon Web Services Laptop Analyitcs Programming Cameras dark theme Software Tips Safe Mode Shopping Supercomputer Criminal Google Search Customers Emails Hosted Computing IT Infrastructure Sync GDPR AI Audiobook FinTech Wireless Internet Online Shopping Bing Touchpad File Sharing Social Network Antivirus Politics Netflix Inventory Investment Advertising Two Factor Authentication Specifications Windows 8 Camera Employees Root Cause Analysis Wire Employee/Employer Relationships Evernote IT service Music Travel Notifications Printer Server Windows 365 HBO Knowledge ISP ROI Millennials Tablet Skype Printers Video Conferencing Sales Data loss Smart Office Bitcoin Wireless Charging Shortcuts Domains Relocation Troubleshooting Point of Sale Outlook Personal Leadership Cryptomining IaaS Workforce Maintenance Start Menu Virtual Private Network Supply Chain Management Bloatware Monitoring Screen Mirroring Batteries Video Games Loyalty Cables Books Windows 8.1 Frequently Asked Questions Digitize Worker Commute Experience Windows 10s Nanotechnology Windows Server 2008 R2 Telecommuting Tablets Mobile Project Management Entrepreneur Customer relationships Cast Scalability Cortana Manufacturing Emergency Email Best Practices Tip of the week IT Assessment Business Owner webinar Digital Signature Warranty Public Cloud Employer Employee Relationship Shortcut NarrowBand Professional Services Cost Management Computer Tips HVAC Managed IT Service Search Assessment Google Apps Security Cameras Consultant Analysis Biometric Security iPhone Social Networking Analytics Virtual CIO Windows Server 2008 OneDrive Administrator Peripheral Devices Tools Digital Security Cameras Enterprise Content Management Using Data Television Best Available Accountants 5G Running Cable Files WIndows 7 MSP Copiers Microchip Quick Tip Thought Leadership Credit Cards Chromecast Memory Ergonomics Password Management Public Computer Password Manager Smartwatch OLED Colocation Transportation Multi-Factor Security Uninterrupted Power Supply Regulations Development

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code