Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Better Update Your Microsoft Password Today

You Better Update Your Microsoft Password Today

While we would strongly recommend that you update your passwords more than once a year, now is as good a time as any to do so. Reflecting on this, let’s go over how to fully lock down your Microsoft accounts.

We should start with a bit of a warning. In December, a massive cybersecurity attack targeted the US government via (along with other tools) Microsoft Office. As it was revealed, foreign hackers were monitoring the US Treasury Department and the National Telecommunications and Information Administration through their email accounts.

While Microsoft hasn’t identified any specific vulnerabilities within their cloud services or applications (a good sign, for certain), they have shared some practices to help users properly and comprehensively secure their data. These practices are important to keep in mind for both your personal and business accounts.

What is Included in a Microsoft Account?

Your Microsoft account will include many programs under its purview… basically, anything that Microsoft contributes to will be tied to this account, including:

  • Windows
  • Outlook
  • Office
  • Skype
  • OneDrive
  • Xbox Live
  • Bing
  • Microsoft Store
  • MSN

How to Update Your Microsoft Account Password

Microsoft has made the process somewhat simple and straightforward.

  • Visit https://account.microsoft.com/
  • Click Sign In on the top right if you aren’t already signed in. If you are already signed in, the page will display your name with options about your subscriptions and other services. Once you sign in with your email and password, you’ll be taken to this page.
  • Towards the top of the page, on the right-hand side, you’ll see an option that says Change Password. Click it.
  • If you have Two-step verification enabled, it will walk you through verifying your account with a text, an email, or using the Microsoft Authenticator app. If you don’t have that set up, don’t worry, we’re going to get you set up after you change your password.
  • Once prompted, enter your current password, and then come up with a brand-new password.

An important consideration: You need to make sure that every password you create abides by certain best practices, like not being used for more than one account and involving no personal details or identifiable information. If pressed, select four random and unrelated words, switch up some of the capitalization, and substitute numbers and symbols for some letters—the more complicated, the better.

Helpfully, Microsoft has included a feature that will require a password change every 72 days. While this sounds like a pain to deal with, it can help reduce the chance of your password being breached and therefore can keep your account more secure.

Additional Security Features

While we’re changing your password, let’s go ahead and add another layer to your security in the form of Two-Step Verification. Setting this up will require you to provide proof of your authenticity beyond just having the right username and password. Work accounts may need administrator permissions to activate it, but it is worth doing.

Once you change your password, you should be directed to Microsoft’s account security page, where you will find the option to activate two-step verification. You’ll be walked through the process via on-screen instructions that will tell you how to link an authenticator application on your smartphone (like Google Authenticator, LastPass Authenticator, Duo Mobile, and other examples). If you don’t have one, you’ll be instructed how to set up Microsoft Authenticator, or you can opt in to one of these other options.

You’ll be taken through the setup process and asked to verify your contact information.

From that point forward, you’ll need to use your authentication app to log into your Microsoft account on a new device, or anytime you want to make changes like updating your password. You’ll be able to use other programs, like Word or Outlook, as normal. Make sure that you keep an eye on your emails and text messages for any Microsoft may send you.

This process can take mere minutes but deliver lasting benefits to your security. For more assistance with locking down your work accounts, or any other of your IT needs, make sure you reach out to Total Tech Care by calling 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Smartphones Business Continuity Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Passwords Windows 10 Virtualization Saving Money Holiday Social Media Tech Term Gadgets Chrome Automation Managed Service Managed IT Services Microsoft Office Computers Facebook Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Networking IT Support Internet of Things Health Hacking Wi-Fi Remote Spam Office 365 Telephone Systems Covid-19 Information Information Technology Managed Service Provider Alert Router Bandwidth BDR Recovery Employer-Employee Relationship Social Engineering Mobility Password Remote Monitoring Money Mobile Computing Encryption Applications App Application History Law Enforcement Data Breach Human Resources Big Data Mobile Office Apps How To Blockchain Office Tips Paperless Office Data Storage Training Patch Management Government VPN Private Cloud Remote Computing Managed IT HaaS Data Security Work/Life Balance Flexibility Marketing WiFi IT solutions Entertainment Website Google Drive Budget Wireless Vulnerability Avoiding Downtime Windows 7 Gmail Word Infrastructure Settings Voice over Internet Protocol Servers Two-factor Authentication Bring Your Own Device Mouse Data Management Cleaning User Error Meetings End of Support Vendor Education Physical Security Safety Managed Services Risk Management Display Hacker USB Sports HIPAA Telephone System Staff Redundancy Software as a Service Conferencing The Internet of Things Keyboard Machine Learning Lithium-ion battery Employee/Employer Relationship Connectivity Remote Work Scam RMM Firewall Vendor Management Save Time Virtual Reality Apple Social Data Protection Workplace Strategy Net Neutrality Current Events Computing Infrastructure Going Green Telephony Unified Threat Management Computer Accessories Help Desk Samsung Comparison Printing CES Value Battery Wearable Technology Shadow IT Retail Hard Drives Electronic Medical Records Business Technology Legal Content Management Managed Services Provider Spam Blocking Instant Messaging Printer Robot Excel Access Control Bluetooth Internet Exlporer Database Hiring/Firing Virtual Assistant Biometrics Remote Workers Virtual Desktop Authentication PDF Processor DDoS IT Consultant Proactive IT Update SharePoint Hard Drive Best Practice Business Intelligence YouTube Humor Worker Black Market Google Docs Audit Computing IT Management Customer Service Identity Theft Environment Botnet IT Plan Fax Server Document Management Solid State Drive Wireless Technology Augmented Reality How to Downtime Fraud SaaS Unsupported Software Digital Signage Charger Remote Worker Data storage Automobile Compliance Cryptocurrency Network Congestion Procurement OneNote Virus Computer Care eWaste Amazon Web Services User Social Network PowerPoint Windows Media Player Tablets Cache Two Factor Authentication Safe Mode Criminal Investment Netflix Entrepreneur Employee/Employer Relationships Root Cause Analysis GDPR Hosted Computing Reputation Employees Streaming Media Windows 365 Online Shopping Managing Stress Tech Support HBO Shortcut ISP Knowledge Content Music Wireless Internet File Sharing Techology Laptop Video Conferencing Skype ROI Cost Management Bitcoin Data loss Cameras Social Networking Shortcuts Camera Inventory Customers Sales Specifications Point of Sale Evernote Personal Outlook Cryptomining Leadership Audiobook Troubleshooting Wire Touchpad Supply Chain Management Travel Start Menu Batteries Screen Mirroring Loyalty Printers Monitoring Millennials Running Cable Advertising Windows 8.1 Wireless Charging Digitize Frequently Asked Questions Memory Politics Books Smart Office Mobile Windows Server 2008 R2 Windows 10s Notifications Cast Printer Server Virtual Private Network Customer relationships Workforce Email Best Practices Cables IT Assessment Tip of the week Manufacturing webinar Emergency Employer Employee Relationship Professional Services Public Cloud Managed IT Service Security Cameras Assessment Science Project Management Nanotechnology Relocation Computer Tips Telecommuting Virtual CIO Cortana OneDrive Windows Server 2008 Biometric Security Video Games Digital Signature Peripheral Tools Distributed Denial of Service Using Data Customer Relationship Management Television Warranty Worker Commute Digital Security Cameras Google Apps Copiers 5G Analyitcs Experience HVAC Programming Scalability Analysis Quick Tip Smartwatch Public Computer Administrator Business Owner Devices Ergonomics Enterprise Content Management NarrowBand Development Regulations OLED Transportation Computer Fan Rootkit MSP Search Accountants PCI DSS Consultant Antivirus Virtual Machine Credit Cards Fiber Optics Analytics Employee Windows 8 Microchip Thought Leadership iPhone 2FA Benefits Password Management Password Manager Messaging IT service Cabling Workers FENG Policy Multi-Factor Security Best Available Hypervisor WIndows 7 Trend Micro IBM Tablet Search Engine Twitter Files Dark mode Smart Technology NIST Business Mangement Chromecast SMS Flash Domains Default App Smart Tech Procedure Trending Saving Time dark theme Amazon IaaS Uninterrupted Power Supply Shopping Software Tips Maintenance Google Search Supercomputer Addiction Colocation Recycling AI Sync IT Infrastructure Emails Bloatware Bing Wiring Practices Monitor FinTech

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code