{"id":54122,"date":"2023-10-12T19:15:00","date_gmt":"2023-10-12T19:15:00","guid":{"rendered":"http:\/\/5e80e330-b2c4-4352-8987-00cd5e1d7f7c"},"modified":"2023-10-12T19:15:00","modified_gmt":"2023-10-12T19:15:00","slug":"how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/","title":{"rendered":"How to lock down your Microsoft account and guard it from attackers"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f27f3565f4129ff50b472e46ae0d7ac74a1c799b\/2023\/09\/28\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\/gettyimages-1599973349.jpg?auto=webp&amp;width=768\" alt=\"colorkeyboardgettyimages-498528113\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/d52822ea643add32ee42b7a2d5beacd1651b7488\/2023\/09\/28\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\/gettyimages-1599973349.jpg?auto=webp&amp;width=1024\" alt=\"colorkeyboardgettyimages-498528113\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/721ae714fdbc4eca1a1956e9b5f4009b78300666\/2023\/09\/28\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\/gettyimages-1599973349.jpg?auto=webp&amp;width=1280\" alt=\"colorkeyboardgettyimages-498528113\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/721ae714fdbc4eca1a1956e9b5f4009b78300666\/2023\/09\/28\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\/gettyimages-1599973349.jpg?auto=webp&amp;width=1280\" alt=\"colorkeyboardgettyimages-498528113\" width=\"1280\" height=\"853.3333333333333\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Gorgaiphotography\/Getty Images<\/span><\/figcaption><\/figure>\n<p>What&#8217;s your most valuable online account, the one most deserving of protection? If you have a personal Microsoft account, that account should be among those you guard most jealously. That&#8217;s especially true if you use that account and its associated email address to sign in to one or more Windows PCs or to create and save documents using the Office apps in&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/what-is-microsoft-365-formerly-office-365-everything-you-need-to-know\" rel=\"follow\">Microsoft 365<\/a> and <a href=\"https:\/\/www.zdnet.com\/article\/how-to-take-advantage-of-microsoft-onedrive-in-windows-11\/\" rel=\"follow\">Microsoft&#8217;s OneDrive<\/a> cloud storage service.&nbsp;<\/p>\n<div class=\"c-shortcodePinbox c-shortcodePinbox-single g-border-thin-light-top g-outer-spacing-top-medium g-outer-spacing-bottom-medium g-inner-spacing-bottom-small\">\n<h3 class=\"c-sectionHeading\">Special Feature<\/h3>\n<\/p><\/div>\n<p>In this post, I list seven steps you can take to help you lock that account down so it&#8217;s <a href=\"https:\/\/www.zdnet.com\/article\/online-security-101-how-to-protect-your-privacy-from-hackers-spies-and-the-government\/\" rel=\"follow\">safe from online attacks<\/a>. Your goal is to prevent an unauthorized person from stealing your account credentials and using them to access your private information.&nbsp;<\/p>\n<p>As always, there&#8217;s a balancing act between convenience and security, so I&#8217;ve divided the steps into three groups, based on how tightly you want to lock down your Microsoft account.<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/6-simple-cybersecurity-rules-to-live-by\/\" rel=\"follow\">6 simple cybersecurity rules to live by<\/a><\/strong><\/p>\n<p>And here&#8217;s an important note right up front: This article is about the free consumer Microsoft accounts used with Microsoft 365 Family and Personal editions and the personal OneDrive service. These accounts are typically associated with an email address using the @outlook.com domain, although older accounts might also use @hotmail.com, @live.com, or @msn.com. Security settings for <span class=\"c-commerceLink\"><a href=\"https:\/\/click.linksynergy.com\/deeplink?id=IokOf8qagZo&amp;mid=46107&amp;u1=subid_value&amp;murl=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fbusiness\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><span>business and enterprise Microsoft 365 accounts,<\/span><!----><\/a><\/span> which use the OneDrive for Business cloud service, are managed by domain administrators through Entra ID (formerly known as Azure Active Directory), using a completely different set of tools.<\/p>\n<p><!----><\/p>\n<h2>How much security do you need?<\/h2>\n<p><strong>Baseline: <\/strong>The baseline level of security (steps 1-3) is perfectly acceptable for most casual users of Microsoft services, especially those who don&#8217;t use their Microsoft email address as a primary factor for signing in to other sites. If you&#8217;re helping a friend or relative who&#8217;s technically unsophisticated and intimidated by passwords, these options will do a lot of good.<\/p>\n<p>The first step is to create a strong password for your Microsoft account, one that&#8217;s not used by any other account. Next, you&#8217;ll turn on two-step verification (Microsoft&#8217;s term for <a href=\"https:\/\/www.zdnet.com\/article\/better-than-the-best-password-how-to-use-2fa-to-improve-your-security\/\" rel=\"follow\">multi-factor authentication<\/a>) to protect yourself from&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\" rel=\"follow\">phishing<\/a>&nbsp;and other forms of password theft. Enabling that feature requires you to supply additional proof of your identity when you sign in for the first time on a new device or when you perform a high-risk activity, such as changing your password or adding a credit card to your account. The additional verification typically consists of a code sent in an SMS text message to a trusted device or in an email message to a registered alternate account.<\/p>\n<p>Finally, you&#8217;ll save a recovery code that allows you to access your account if you forget that password and don&#8217;t have access to any other authentication methods.<\/p>\n<p><strong>Better: <\/strong>Those baseline precautions are adequate, but you can tighten security significantly with the actions outlined in steps 4 and 5.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/user-forgetfulness-drives-preference-for-biometrics-over-passwords\/\" rel=\"follow\">User forgetfulness drives preference for biometrics over passwords<\/a><\/strong><\/p>\n<p>First, install the Microsoft Authenticator app on your smartphone (it&#8217;s available for <a href=\"https:\/\/apps.apple.com\/us\/app\/microsoft-authenticator\/id983156458\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">iPhone<\/a> and <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.azure.authenticator&amp;hl=en_US&amp;gl=US&amp;pli=1\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">Android<\/a> devices) and set it up for use as a sign-in and verification option. Then add a secure email address as a backup factor to verify your identity.<\/p>\n<p><strong>Maximum: <\/strong>The final two steps provide the most extreme security, adding at least one <a href=\"https:\/\/www.zdnet.com\/article\/best-security-key\/\" rel=\"follow\">physical hardware key<\/a> along with the Microsoft Authenticator app, and then removing SMS text messages as a backup verification factor. With that configuration, you can still use your mobile phone as an authentication factor, but a would-be attacker won&#8217;t be able to break into your account by intercepting text messages or hijacking your mobile phone account.<\/p>\n<p>That configuration places significant roadblocks in the way of even the most determined attacker. It requires an extra investment in hardware and it definitely adds some friction to the sign-in process, but it&#8217;s by far the most effective way to secure your Microsoft account.<\/p>\n<p>Let&#8217;s get started.<\/p>\n<h2>Here&#8217;s how to lock down your Microsoft account<\/h2>\n<div id=\"6caeb399-c34a-4ef9-b2e3-7acefefafd8f\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"10.5\">\n<div class=\"c-ShortcodeContent\" readability=\"41\">\n<p>First things first: You need a strong, unique password for your Microsoft account. Microsoft requires a minimum password length of eight characters, but security experts recommend that you make your password longer. A good length is 12-16 characters, using any random combination of uppercase and lowercase letters, numbers, and special characters. You can also use a passphrase consisting of four or more randomly selected words, separated by a special character such as a hyphen.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<p>The best way to ensure that you&#8217;ve nailed this requirement is to use your password manager&#8217;s tools to generate a brand-new, random password or passphrase. (No password manager? Try an online option like the&nbsp;<span class=\"c-commerceLink\"><a href=\"https:\/\/www.anrdoezrs.net\/links\/9041660\/type\/dlg\/sid\/subid_value\/https:\/\/1password.com\/password-generator\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><span>1Password Strong Password Generator<\/span><!----><\/a><\/span> or the&nbsp;<span class=\"c-commerceLink\"><a href=\"https:\/\/bitwarden.com\/password-generator\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><span>Bitwarden Password Generator<\/span><!----><\/a><\/span>.)<\/p>\n<p>Generating a new password ensures that your account credentials are not shared with any other account; it also guarantees that an older password that you might have inadvertently reused isn&#8217;t part of a password breach.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/best-password-manager\/\" rel=\"follow\">The best password managers to save you from login hassle<\/a>&nbsp;<\/strong><\/p>\n<p>To change your password, go to the Microsoft Account Security Basics page at&nbsp;<a href=\"https:\/\/account.microsoft.com\/security\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">https:\/\/account.microsoft.com\/security\/<\/a>. Sign in, if necessary, then click Change Password. (But don&#8217;t check the box that requires you to change your password every 72 days. That will surely annoy you, and it won&#8217;t make your account appreciably more secure.)&nbsp;<\/p>\n<p>Follow the instructions to save the new password using your password manager. Feel free to write it down, if you prefer a physical backup. Just make sure to store the paper in a secure location, such as a locked file drawer or a safe.<\/p>\n<div id=\"8eaf1794-39ff-4636-9dbd-fa1f47dabad7\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"9.5\">\n<div class=\"c-ShortcodeContent\" readability=\"39\">\n<p>Don&#8217;t leave the Microsoft Account Security page just yet. Instead, scroll up to the Two-Step Verification section (under the Additional Security heading) and make sure this option is turned on.<\/p>\n<p>The setup process is a fairly straightforward wizard that confirms you are able to receive verification messages. If you&#8217;re using a modern smartphone with an up-to-date version of iOS or Android, you can safely ignore the prompts to create an app password for the mail client on those phones.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"b077c09c-71a8-4018-9867-0c6416001839\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"16.403716216216\">\n<div class=\"c-ShortcodeContent\" readability=\"51.033783783784\">\n<p>The next step is to save a recovery code. If you&#8217;re ever unable to sign in to your account because you&#8217;ve forgotten the password, having access to this code will save you from being permanently locked out.<\/p>\n<p>Setting up two-step verification, as you did in the previous step, automatically prompts you to create a recovery code. If you didn&#8217;t keep a copy of that code, you&#8217;ll need to create a new one. On the Microsoft Account Security Basics page, find the Advanced Security Options section and click Get Started. That takes you to the not-so-basic Microsoft Account Security page. (To go there directly, bookmark this address:&nbsp;<a href=\"https:\/\/account.live.com\/proofs\/Manage\/additional\" class=\"c-regularLink\">https:\/\/account.live.com\/proofs\/Manage\/additional<\/a>.)<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/how-ai-can-improve-cybersecurity-by-harnessing-diversity-according-to-microsoft-securitys-vasu-jakkal\/\" rel=\"follow\">How AI can improve cybersecurity by harnessing diversity<\/a><\/strong><\/p>\n<p>Scroll to the bottom of the page and look for the Recovery Code section. Click Generate A New Code to display a dialog box like the one shown here.<\/p>\n<p>Print out that recovery code and file it away in the same locked file cabinet or safe where you put your password. (Microsoft allows you to generate only one code at a time for a Microsoft account. Generating a new code renders the old code invalid.)<\/p>\n<p>And now for some more advanced security options.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"7d0453c3-d585-43bd-a87c-82e323453733\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"15.193277310924\">\n<div class=\"c-ShortcodeContent\" readability=\"47.267973856209\">\n<p>Smartphone apps that generate Time-based One-time Password Algorithm (TOTP) codes are an increasingly popular form of multi-factor authentication, and I highly recommend their use for any service that supports them. (For more on these options, see&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/protect-yourself-how-to-choose-the-right-two-factor-authenticator-app\/\" rel=\"follow\">&#8220;Protect yourself: How to choose the right two-factor authenticator app.&#8221;<\/a>)<\/p>\n<p>Even if you use another authenticator app for most services, I recommend using Microsoft Authenticator with your Microsoft account. In this configuration, any sign-in attempt that requires verification sends a push notification to your smartphone. Approve the request, and you&#8217;re done.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/the-easiest-thing-you-can-do-to-keep-your-phone-secure\/\" rel=\"follow\">The easiest thing you can do to keep your phone secure<\/a><\/strong><\/p>\n<p>An added bonus is that the Microsoft Authenticator app can be used for passwordless sign-in as well as verification.<\/p>\n<p>To set up Microsoft Authenticator with a Microsoft account, go to the&nbsp;<a href=\"https:\/\/account.live.com\/proofs\/Manage\/additional\" class=\"c-regularLink\">advanced Microsoft Account Security page<\/a>&nbsp;and click Add A New Way To Sign In Or Verify. Choose the Use An App option and then, after installing the Microsoft Authenticator app, sign in using your account credentials.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"6d17e674-7358-4a70-9596-fa43a2bd44a9\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"14.698966408269\">\n<div class=\"c-ShortcodeContent\" readability=\"48.364341085271\">\n<p>Microsoft recommends that you have at least two forms of verification available in addition to your password. If you need to reset your password, when two-step verification is enabled, you&#8217;ll need to supply both of those forms of identification or you risk being permanently locked out.<\/p>\n<p>A free email address, such as a Gmail account, is acceptable if your security needs are minimal, but a business email address secured by a professional IT staff is a much better choice. If necessary, you can have a verification code sent to that email address.<\/p>\n<p>Go to the&nbsp;<a href=\"https:\/\/account.live.com\/proofs\/Manage\/additional\" class=\"c-regularLink\">advanced Microsoft Account Security page<\/a>&nbsp;and click Add A New Way To Sign In Or Verify.<\/p>\n<p>Choose the Email A Code option, enter your email address, and then enter the code you receive to confirm that verification option.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"3a6b5a34-1c4f-4dd0-b6d1-4d0f01418a6a\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"14.942779291553\">\n<div class=\"c-ShortcodeContent\" readability=\"46.488646684832\">\n<p>This step is the most advanced of all. It requires an investment in extra hardware, but the requirement to insert a device into a USB port or make a connection via Bluetooth or NFC adds the highest level of security.<\/p>\n<p>For an overview of how this type of hardware works, see&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/yubikey-hands-on-hardware-based-2fa-is-more-secure-but-watch-out-for-these-gotchas\/\" rel=\"follow\">&#8220;YubiKey hands-on: Hardware-based 2FA is more secure, but watch out for these gotchas.&#8221;<\/a><\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/best-security-key\/\" rel=\"follow\">The best security keys to protect yourself and your business<\/a><\/strong><\/p>\n<p>To configure a hardware key, go to the&nbsp;<a href=\"https:\/\/account.live.com\/proofs\/Manage\/additional\" class=\"c-regularLink\">advanced Microsoft Account Security page<\/a>&nbsp;and click Add A New Way To Sign In Or Verify. Choose the Use A Security Key option and then follow the prompts. You&#8217;ll need to enter the PIN for your hardware key, then touch to activate it. When that setup is complete, you&#8217;ve got a powerful way to sign in to any service powered by your Microsoft account without having to fuss with passwords.<\/p>\n<p>As I mentioned at the start of this article, most people don&#8217;t need this level of advanced protection. But if your OneDrive account includes valuable documents like tax returns and bank statements, you&#8217;ll want to lock it down as tightly as possible.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<h3><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You can get a Microsoft account for free, but that doesn&#8217;t begin to describe its value, especially if you use that account for crucial email and cloud storage. Here are seven steps to establish a solid baseline of security and protection.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-54122","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to lock down your Microsoft account and guard it from attackers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to lock down your Microsoft account and guard it from attackers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-12T19:15:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/721ae714fdbc4eca1a1956e9b5f4009b78300666\/2023\/09\/28\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\/gettyimages-1599973349.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How to lock down your Microsoft account and guard it from attackers\",\"datePublished\":\"2023-10-12T19:15:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\\\/\"},\"wordCount\":1761,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/721ae714fdbc4eca1a1956e9b5f4009b78300666\\\/2023\\\/09\\\/28\\\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\\\/gettyimages-1599973349.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\\\/\",\"name\":\"How to lock down your Microsoft account and guard it from attackers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/721ae714fdbc4eca1a1956e9b5f4009b78300666\\\/2023\\\/09\\\/28\\\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\\\/gettyimages-1599973349.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-10-12T19:15:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/721ae714fdbc4eca1a1956e9b5f4009b78300666\\\/2023\\\/09\\\/28\\\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\\\/gettyimages-1599973349.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/721ae714fdbc4eca1a1956e9b5f4009b78300666\\\/2023\\\/09\\\/28\\\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\\\/gettyimages-1599973349.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to lock down your Microsoft account and guard it from attackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to lock down your Microsoft account and guard it from attackers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/","og_locale":"en_US","og_type":"article","og_title":"How to lock down your Microsoft account and guard it from attackers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-10-12T19:15:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/721ae714fdbc4eca1a1956e9b5f4009b78300666\/2023\/09\/28\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\/gettyimages-1599973349.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How to lock down your Microsoft account and guard it from attackers","datePublished":"2023-10-12T19:15:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/"},"wordCount":1761,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/721ae714fdbc4eca1a1956e9b5f4009b78300666\/2023\/09\/28\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\/gettyimages-1599973349.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/","url":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/","name":"How to lock down your Microsoft account and guard it from attackers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/721ae714fdbc4eca1a1956e9b5f4009b78300666\/2023\/09\/28\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\/gettyimages-1599973349.jpg?auto=webp&amp;width=1280","datePublished":"2023-10-12T19:15:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/721ae714fdbc4eca1a1956e9b5f4009b78300666\/2023\/09\/28\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\/gettyimages-1599973349.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/721ae714fdbc4eca1a1956e9b5f4009b78300666\/2023\/09\/28\/4b7f5e2a-32b7-482d-95ef-4d4cbfce5a8e\/gettyimages-1599973349.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-to-lock-down-your-microsoft-account-and-guard-it-from-attackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"How to lock down your Microsoft account and guard it from attackers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54122"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54122\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}