Tech Tip: How to use browser profiles • Blisstech Solutions

This Tech Tip is on how to use web browser profiles.

If you are a freelancer, virtual assistant, or just wear many hats in your job role, you probably have multiple different logins for the same application.

As so many applications are web-based, we have to login to them with a web browser, and if you have multiple logins for the same application, it can get VERY MESSY!

This is no more true than for Microsoft 365 and it can be tricky sometimes to know which account you are using. If you struggle with this, you should start to use separate browser profiles to keep your logins separate from each other.

Although this tip is focused on Microsoft 365, you can apply the same principle for Google, Hubspot or any other application you use through a web browser.

Well, this week’s tip will show you:
👉 How to create a new browser profile
👉 How to configure this profile to automatically log you into Microsoft 365
👉 How to change the appearance of your profile so you can see, at a glance, which profile you are using

Today’s tip will help you to:
đź’Ą Simplify the process of working with multiple logins
đź’Ą Stop the confusion over which account you are logged in as
đź’Ą Keep your logins separated while speeding up switching between accounts

We hope you enjoy it. To learn more you can subscribe to our newsletter.

Feel free to get in touch if you want to know more.

More Content

How to use footnotes and endnotes in Word

Tech Tip: How to use footnotes and endnotes in Word

This Tech Tip is another tip for Microsoft Word. If you use Word to write documentation, contracts or any other type of detailed document, then this tip is for you. Usually, when you write such a document, you may need to expand on certain sentences without making the...
This tiny tweak to Teams will make meetings smoother

This tiny tweak to Teams will make meetings smoother

Sick of saying “next slide please” in your Teams meetings? Microsoft has a small but powerful new feature that will put an end to that. Find out more here…

Logos for Microsoft 365

Migrate to Microsoft 365 manually using PST files

When you are migrating to Microsoft 365 from an existing email provider, you'll want to migrate the emails, contacts and calendar from your users existing mailboxes to their shiny new Microsoft 365 mailboxes.  The best-case scenario is your provider will migrate you...

Tech Tip: What is Autosave and Version History?

This is the latest Tuesday Two Minute Tech-tip that explains the AutoSave and Version History features of Office 365. When we migrate businesses to Microsoft 365 and they start working with OneDrive and SharePoint, I often hear the question, "How do I save my files...
How future-ready is your business’s IT?

How future proof is your business’s IT?

Your business’s tech might be working well today, but is it ready for tomorrow? A new study has found more than 60% of business leaders aren’t confident about theirs. What about yours?

Tech Tip: How to use Pivot Tables in Excel

Welcome to Tuesday's Two Minute Tech Tip where Matt shows you how you can explore your Excel data using the power of Pivot Tables. Pivot Tables are a powerful feature of Excel that allows you to manipulate your flat Excel data to perform calculations and create charts...
And the award for most common phishing scam goes to…

And the award for most common phishing scam goes to…

Which phishing scam are you and your employees most at risk from? We tell you about the most common phishing emails and the easy way to stay safe.

Cyber security training once a year isn’t working

Cyber security training once a year isn’t working

You’re wasting your time on annual cyber security training. Why? Because it’s simply not cutting it anymore. Discover a better plan here.

Tech Tip: How to use Conditional Formatting in Excel

This Tuesday Two Minute Tech-tip shows you how to automatically add pizzaz to your spreadsheets. Using a feature called 'Conditional Formatting', you can automatically format the cells of your Excel spreadsheet based on what is in them. For example, you can emphasise...
How to create secure passwords

How to create secure passwords

Weak passwords are one of the biggest security risks to your business.
Why?
Because cyber criminals are getting smarter than ever before. If they manage to crack just one password, they could gain access to your sensitive business data, financial information, or even gain control of your entire system.
Cyber criminals use automated tools to guess passwords, allowing them to try out millions of combinations in seconds. So, if you’re using something like “Password123” or “CompanyName2025”, you’re practically handing them the keys to your business.
A compromised password can lead to big issues, such as:
• Data breaches
• Financial losses
• Identity theft
• Reputation damage
But how do you create strong passwords without driving yourself (and your team) mad?
Think of your password like a secret recipe, where only you should know the ingredients. It should:
• Be at least 14 characters long (the longer, the better)
• Include a mix of uppercase and lowercase letters
• Contain a few numbers and symbols (like @, $, %, or &)
• Not contain any common words or easily guessable information (like birthdays, names, or the word “password”)
Instead of using a single word, you could try a passphrase – a short, random sentence that only you would understand. For example, instead of “Sailing2025”, try something like “Coffee&CloudsAreGreat9!”. This is much harder to crack, yet still easy to remember.
You should also steer clear of these common mistakes:
• Using personal info (your name, birthday, business name, etc.)
• Reusing the same passwords across multiple accounts
• Using simple sequences (“123456” or “abcdef”)
• Storing passwords in an easily accessible place (like a sticky note on your desk)
If remembering unique passwords for every account sounds impossible, there is another option: Password managers. These generate strong passwords, store them securely and autofill them for you.
With a password manager, you only need to remember one strong master password for the manager app itself. The rest are encrypted and stored safely, reducing the risk of data breaches.
Even the strongest password isn’t foolproof, which is why multi-factor authentication (MFA) is also important. MFA requires a second form of verification, like a one-time code sent to your phone or generated from an authentication app.
If you have employees accessing your business systems, it’s a good idea to have a password policy in place to explain your rules and why they’re important. This should include:
• Unique passwords for each system and account
• Regular security training on password best practices
• Business-wide use of MFA for critical systems
• Scanning for compromised passwords regularly
By making password security a priority, you can reduce the chances of a cyber attack creating a nightmare for your business.
And if you need help making your business more secure, get in touch.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05