BNMC Blog

Tip of the Week: Activating Two-Step Verification on a Microsoft Account

Tip of the Week: Activating Two-Step Verification on a Microsoft Account

Two-step authentication/verification has seen considerable popularity as a means of securing an account. To help you boost the protections surrounding your Microsoft account, we’re offering a few tips on how to use two-step verification, as Microsoft refers to it.

What is Two-Step Verification?

This security measure compounds the traditional password with a second proof of identity, which Microsoft calls the user’s security info. Microsoft’s approach is to reach out to the user each time a device is used to access the account that hasn’t yet been designated as a trusted device. Via a phone call, email, or an authenticator application, two-step verification asks the user to confirm that yes, the current attempt to access the account is legitimate.

Turning on Two-Step Verification for Your Microsoft Account

The process to activate two-step verification is simple:

  • Sign into the Security basics page for your Microsoft account
  • Access More security options
  • Locate Two-step verification, and select Set up two-step verification
  • Follow the on-screen instructions to complete the process

You have the option of selecting a phone number, an email address, or an authentication app to use. If you choose to use an application, but not the Microsoft Authenticator app, you will have to follow the provided on-screen instructions to link your account to the app of your choice.

Setting up two-step verification on any account you use can greatly benefit your security. To learn more ways to secure your work-essential technology, reach out to the IT professionals at BNMC by calling 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 30 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Productivity Privacy Cloud User Tips Network Security Microsoft Email Software Computer Hackers Malware Hosted Solutions Google Data Business Communication Small Business Mobile Devices IT Services Efficiency IT Support Tech Term Workplace Tips Hardware Managed IT Services Internet Data Recovery Backup Innovation Ransomware Cloud Computing Smartphone Windows Smartphones Android Outsourced IT Upgrade Mobile Device Users Saving Money Miscellaneous Data Backup Facebook Phishing Windows 10 Information Server Business Management Network Browser Office 365 Social Media Managed IT Services Business Continuity Microsoft Office Cybersecurity Passwords communications Internet of Things Data Management Windows 10 VoIP Productivity Vulnerability Remote Monitoring Gmail Gadgets App Word Disaster Recovery Chrome Artificial Intelligence Infrastructure Quick Tips Managed Service Apps Encryption Analytics Settings Managed Service Provider Save Money Access Control VPN Applications Router IT Support Virtual Reality Money Company Culture Website Tip of the week BYOD Employer-Employee Relationship Big Data Display Education Paperless Office Apple HIPAA Storage BDR Networking Robot Unified Threat Management IT Management Data Security Automation Hacker Data storage Virtual Private Network Employee-Employer Relationship YouTube Collaboration Firewall Maintenance Risk Management Government Remote Workers Office Tips Information Technology Computers Google Drive Avoiding Downtime Bandwidth Development Content Filtering Antivirus Hard Disk Drive Break Fix Search Downtime Vendor Management Printing Mobile Security IT Marketing Monitors Password Social Network iOS Chromebook Data loss Telephone Systems Server Management Business Technology Business Intelligence Touchscreen desktop End of Support Managed IT Tablet Spam Computing Remote Computing Outlook WiFi Bring Your Own Device Operating System Social MSP SaaS LiFi Augmented Reality Document Management OneNote Wi-Fi Hosted Solution Data Breach Humor Managing Stress Two-factor Authentication Administration Holiday Solid State Drive Windows 7 Virtualization Wireless Software as a Service Laptop Managed IT Service Mouse The Internet of Things Customer Relationship Management Retail Scam Alert Content Huawei Heating/Cooling Multi-Factor Security IT solutions Politics Going Green Fraud Cost Management Memes G Suite Messaging Google Docs Identity Continuity Automobile Time Management Printer Work/Life Balance Hacks Screen Reader Charging Dell Entertainment Vendor Customer Service Smart Office Digital Signage Data Warehouse Wires Cabling Shortcuts Mobile Management Cybercrime Black Friday Private Cloud Google Wallet Licensing Dongle Gamification Monitoring WannaCry Solid State Drives Office Samsung Bitcoin Google Maps Streaming Processor Servers Google Calendar Tech Support Assessment Employee-Employer Relationships Emergency Business Growth Solar Network Management Smart Tech Hybrid Cloud Dark Web Legal Work Troubleshooting Business Analysis Windows 8 Voice over Internet Protocol Security Cameras Profiles Cyber Monday Unified Communications Drones Cooperation Service Level Agreement COVID-19 Spying National Security Social Engineering Human Error Memory Legislation Websites Hotspot Internet Exlporer Holidays Analysis Students Compliance SharePoint Mobile Device Management Connectivity Distribution Scalability Conferencing Halloween Microsoft Excel Deep Learning IT Technicians Optimization Digital Payment Virus Safety Techology Modem FinTech Disaster Managed Services Utility Computing Smart Technology Staff Leominster Digital Updates Device Reducing Cost Statistics Language Value Payment Card Mixed Reality How To Lenovo Alt Codes Regulations Downloads IoT Logistics Migration Consulting Scary Stories Network Congestion Mail Merge Blockchain Mirgation Recycling LED Threats VoIP Unified Threat Management Cookies Uninterrupted Power Supply Laptops Running Cable Shortcut Distributed Denial of Service Budget K-12 Schools PowerPoint Spyware File Sharing Mobility Batteries Bluetooth Comparison Computing Infrastructure Professional Services Inventory Computer Care IBM Buisness Firefox Writing Superfish Typing Social Networking Virtual Desktop Current Events Star Wars Asset Management Sports Address Permissions Best Practice Chatbots eWaste Co-Managed IT User Error Nanotechnology Managed Services Provider Dark Data Patch Management Update Wearable Technology Network upgrade Identity Theft Onboarding GDPR Motherboard Cables Print Toner Myths Specifications Alerts USB Shadow IT Training Slack Corporate Profile Hard Disk Drives Cryptocurrency Mobile Data How To Recovery Supercomputer CrashOverride Motion Sickness Health Staffing Administrator Taxes Black Market Law Enforcement Regulation Web Server what was your? IT Budget Notifications Electronic Medical Records GPS Physical Security IT Consultant Twitter Upgrades Gadget Cameras Emoji Printers Crowdsourcing Meetings Remote Work Tracking Personal Information Botnet Cleaning 3D Printing Mobile Computing CCTV Cortana Webcam Machine Learning Processors Unsupported Software Error Financial Point of Sale Ben McDonald shares Travel Computer Repair Relocation

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3