Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Be Sure to Update Your Microsoft Passwords

Be Sure to Update Your Microsoft Passwords

The new year is upon us and after the debacle that 2020 was, it is extremely welcome. If you are like us, you have a new set of goals that you’ve created for yourself and are probably looking to improve your professional and personal well-being. One way to do that is to ensure that your accounts are secure. Today, we will be going through how to update your password with Microsoft.

You may have heard that the U.S. Government just suffered from a massive cybersecurity breach from an attack that was perpetrated from overseas, and among the systems that were affected was Microsoft Office. Unfortunately, foreign hackers were actively monitoring email accounts between the U.S. Treasury Department and the National Telecommunications and Information Administration (NTIA). Fortunately, however, Microsoft, who is known for its active role in identifying and thwarting cybercrime, didn’t find any active vulnerabilities in their Office 365 applications or cloud services, but they did offer some suggestions, one of which was to do everything you can to protect your data.  

It is important to understand how to take action to ensure your organization—and your personal accounts—are secured properly. 

What You Need to Know About Your Microsoft Account Security

If you actively utilize Office 365, or any other Microsoft product, you need to know a breach would affect you. For your typical user account, their Windows 10 license is tied to their Microsoft account, and if you have Office 365 or use any other Microsoft applications or services, they are covered by those credentials as well. Here is a list of the application titles you need to concern yourself with when considering your Microsoft account security:

  • Windows
  • Outlook
  • Office
  • Skype
  • OneDrive
  • Xbox Live
  • Bing
  • Microsoft Store
  • MSN

Here’s How to Update Your Microsoft Password

To Microsoft’s credit, they make it extremely easy to change your password. Here are the steps:

  1. Visit
  2. Click Sign In on the top right, if you aren’t already signed in. If you are already signed in, the page will display your name with options about your subscriptions and other services. Once you sign in with your email and password, you’ll be taken to this page.
  3. Towards the top of the page, on the right-hand side, you’ll see an option that says Change Password. Click it.
  4. If you have Two-step verification enabled, it will walk you through verifying your account with a text, an email, or using the Microsoft Authenticator app. If you don’t have that set up, don’t worry, we’re going to get you set up after you change your password.
  5. Once prompted, enter your current password, and then come up with a brand new password.

CRUCIAL ADVICE: You never want to use the same password on multiple accounts. Every password you make should be unique, complex, and lack any personally identifiable information (such as your date of birth or your address). Really random works best, but we know it is difficult to remember random passwords. Make sure that your password is something that nobody could guess with variance in case, numbers, and symbols. The more complex your password is, the more secure your accounts are going to be.

One feature Microsoft offers when setting up your credentials is a checkbox that will require you to change your password every 72 days. It really works to secure your account. You might think it’s unnecessary, but consider how much of your personal information is tied up in your relationship with Microsoft. Check it and keep active on protecting your data and account security.

One Last Thing

One thing you should consider when changing your password is to set up Two-step Verification. Click that too. If you are using a Microsoft 365 account through work, you may need your administrator to turn it on and give you further instructions. Give us a ring if you need help.

All you will need to do is follow the on-screen instructions. If you do not already have an authenticator app on your smartphone (like Google Authenticator, Lastpass Authenticator, Duo Mobile, Authy, etc.) Microsoft has a tutorial to help you set up Microsoft Authenticator. If you prefer to use one of the other apps, set it up with your preferred app.

Two-factor verification will require you to use the Authenticator app to log into your Microsoft account on a new device, or make major changes to your Microsoft account (like updating a new password). It won’t require you to use the app every time you want to use Word or Outlook, but it is a good practice to use to ensure you are doing all you can to protect your account and data. 

Keeping your Microsoft account secure isn’t hard, but it is extremely important. If you need help or would like to talk to one of our certified technicians about setting Microsoft products up for your whole business, give us a call at (415) 295-4898 today.

Reconsidering IT Principles Can Help Push Business...
How to Make Your Google Account More Secure


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, March 07 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data IT Support Data Backup Network Security Privacy Hosted Solutions Internet Cloud IT Services Software Email Efficiency Data Recovery Managed IT Services Business Mobile Device User Tips Google Innovation Phishing Collaboration Small Business Malware Hardware Outsourced IT Cybersecurity Hackers Workplace Tips Upgrade Business Management Cloud Computing Computer Tech Term Smartphone Mobile Devices Android Managed Service Microsoft Communication Windows 10 VoIp Backup Business Continuity Quick Tips Covid-19 Smartphones Ransomware Disaster Recovery Managed Service Provider Paperless Office Communications Encryption Passwords Browser Remote Work Network Wi-Fi Data Management Artificial Intelligence Users Office 365 Business Technology Saving Money Server Internet of Things Remote Monitoring Help Desk Managed IT Social Media BDR Holiday Document Management Windows 7 Government Microsoft Office Save Money Healthcare Vulnerability Compliance Laptops Chrome Managed IT services Windows Data Security Automation Applications Blockchain Facebook Scam Miscellaneous Remote Wireless Information Analytics Tip of the week Bandwidth Machine Learning Vendor Management Gadgets Avoiding Downtime Office Project Management Virtualization Antivirus Mobile Office Processor Infrastructure Two-factor Authentication Redundancy Health Employer-Employee Relationship Apps Hard Drive Networking RMM Storage Files Access Control Information Technology Router Mobility Virtual Private Network Proactive Training Meetings OneDrive Managed Services IT Management BYOD Customer Relationship Management Website WiFi Data Loss Company Culture Employee-Employer Relationship Maintenance Software as a Service Net Neutrality VPN Regulations IoT Management File Management Remote Workers Tablet Dark Web Augmented Reality File Sharing Internet Exlporer Smart Technology Voice over Internet Protocol Spam Unified Threat Management Search Payment Cards Computing Display HIPAA Utility Computing Bring Your Own Device Free Resource Professional Services Server Management Monitoring Remote Computing Remote Worker Flexibility Data Storage Mobile Security Financial Remote Monitoring and Management Word Unified Communications Images 101 Patch Management Data Breach Vendor Social Network Operating System Assessment Recycling Electronic Health Records Gmail Employees Network Management The Internet of Things Big Data Downtime Consultation Cooperation Instant Messaging Risk Management Password Consulting Money Alert Holidays Managed Services Provider Customer Service Time Management Co-Managed IT Computing Infrastructure Disaster Resistance Notes Outsourcing Chatbots Favorites Heating/Cooling Microsoft Excel Emergency Multi-Factor Security Nanotechnology Wires Outlook IT Mirgation Read Only Security Cameras Printer User Management Peripheral Mobile Computing Asset Tracking Backup and Disaster Recovery Trending Proactive Maintenance Solid State Drive Star Wars Point of Sale Tech Terms Unified Threat Management Projects Laptop Enterprise Content Management MSP Finance Statistics Google Calendar Fraud Solid State Drives Optimization CES Wearable Technology Shortcut Alerts Proactive IT PowerPoint Video Conferencing Identity Theft Enterprise Resource Planning Conferencing Servers Value of Managed Services Banking App Cyber security Business Telephone Cache Printing Virtual Reality Teamwork PCI DSS Geography Human Error Travel Cybercrime E-Commerce Theft Recovery Firewall Return on Investment Remote Working Social Networking Authentication Bluetooth Lenovo Options Telephone Virtual Machines Comparison Licensing IT Consulting Biometric Identity Samsung Reviews Screen Reader Electronic Medical Records Database Management IT Assessment Data Warehousing SharePoint Shared resources Going Green Modem High-Speed Internet OneNote Permission Technology Tips Tech Support Features Distributed Denial of Service Mail Merge User Error Settings Personal Information Budget G Suite Authorization Legislation Superfish 5G Mobile VoIP Credit Cards Specifications Virtual Assistant Bitcoin Gamification Mobile Politics Websites Manufacturing End of Support Smart Tech GDPR Digitize Private Cloud Operations Downloads Batteries CRM Development How To Test Digital Payment Hotspot IT Technicians Cost Management Procurement Managed IT Service Address Transportation Active Directory Motherboard Chromebook WPA3 Wireless Internet Computers Customer Relationships Black Friday Wasting Time Current Events SaaS Smart Devices Windows Server 2008 Gifts Connectivity Shadow IT Migration eWaste Bookmarks ROI CIO applications Content Filtering Cookies Cables Mouse Language Techology Cyberattacks Social Break Fix Windows Server Vulnerabilities Fleet Tracking Zero-Day Threat Touchscreen Hacking Employer/Employee Relationships Apple Mobile Device Management Cyber Monday Staff Technology Laws Database Outsource IT Managing Stress Permissions Hard Disk Drives Sensors Hacker CEO Students Daniel Stevens Printers Marketing Regulation Twitter Education

Latest Blog

A lot of business is being conducted over the Internet right now, in terms of communication and transactions alike, which makes a business’ capability to remain connected to its clientele even more important. Now is not the time to wonder if your business is as connected as ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...