Microsoft 365 makes Multi-Factor Authentication easier • Blisstech Solutions

Microsoft is planning to enable Multi-Factor Authentication (MFA) directly in its Outlook app for many 365 business users.

MFA is a vital tool to help protect your online accounts from cyber criminals. It works by generating a second, single-use passcode every time you log into an account. It’s usually sent to an authenticator app on your phone that you have to download and set up first.

Security codes can also be sent via SMS text message, by a phone call, or you might be given a special USB key to plug into your computer.

The process is often made quicker by using a biometric login like your fingerprint or face ID. It’s a minor chore, but the protection it offers far outweighs the couple of extra seconds it takes to access your account.

Microsoft isn’t so sure about those extra seconds, though. If the tech giant can save you that time, it’s going to do it. That’s why it’s looking to streamline MFA for Microsoft 365 business accounts.

It’s rolling out the improvement by building MFA directly into the Outlook app in a feature called Authenticator Lite. Until now, it’s relied on a separate authenticator app or sending login codes.

There’s no news yet for those of us who want faster authentication on our personal PCs. If Microsoft does announce plans to make this feature available to more hardware or operating systems, we’ll update you with any news.

If you don’t already use MFA for your apps and online accounts, we recommend that all businesses implement it as soon as possible. The additional security it offers protects against the vast majority of today’s cyber threats.

For more help and advice about implementing MFA or getting the best from Microsoft 365, just get in touch.

More Content

How to use crossreferences in Word

Tech Tip: How to use cross references in Word

Today's Two Minute Tech Tip is another tip for Microsoft Word. If you use Word to write documentation, contracts or any other type of detailed document, then this tip is for you. Usually, when you write such a document, you need to refer to other places in the...
A third of all data loss is caused by problems with backups

The lack of a reliable backup causes a third of all data loss

Your business data is backed up and recovery tools are in place. So, your data is safe, right? Sadly… not always. Here’s why we recommend backups are checked regularly..

Cyber security training once a year isn’t working

Cyber security training once a year isn’t working

You’re wasting your time on annual cyber security training. Why? Because it’s simply not cutting it anymore. Discover a better plan here.

Be more productive with these Microsoft Edge features

Be more productive with these Microsoft Edge features

In the never-ending mission to be more productive, the latest Microsoft Edge browser could be a powerful ally. We’re telling you about 5 of its best productivity features.

Cyber extortion: What is it and what’s the risk to your business?

Cyber extortion: What is it and what’s the risk to your business?

Have you heard of cyber extortion? It’s a very real threat to your business. Here we explain what it is and how to stay safe.

Still using Windows 10? You must act NOW

Still using Windows 10? You must act NOW

Windows 10 reaches its end of life NEXT MONTH. If your business still isn’t prepared, you must start planning. Now. Here’s what you need to consider…

Tech Tip: How to managed Focused and Junk email in Outlook

Welcome to a new Tuesday Two Minute Tech Tip that will help you to manage what you see in your Inbox. Are you wondering where your emails have gone? Is something you expect to see in your Inbox not arriving anymore? This video will show you how to:    👉...

Stop! And think, before you act on that email

Don’t fall victim to cyber criminals. We explain what a BEC attack is and how to protect your business.

Tech Tip: How to Tidy up Copied Data in Excel

This Tuesday Two Minute Tech-tip shows you how to tidy up data in Excel spreadsheets. Do you have data in a messy format and need to change it so it is organised? Have you ever received data in Excel or in a text file or Word document and wanted to change it from rows...
Which ransomware payment option is best? (Hint: none)

Which ransomware payment option is best? (Hint: none)

Cyber criminals are giving you more options when it comes to paying your way out of a ransomware attack. Our advice remains the same though. Find out what that advice is here.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05