fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding the New NIST Guidelines for Password Security

Understanding the New NIST Guidelines for Password Security

The National Institute for Standards and Technology (NIST) has released Special Publication 800-63B, titled Digital Identity Guidelines. The document outlines major changes to the ways password security should be approached and leaves a lot of what network administrators and software developers have implemented recently to be wrong Today, we’ll take a look at the publication, and try to make sense of the sudden change of course.

0 Comments
Continue reading

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Virtualization Productivity Spam Information Data Storage Computer Fan IT Management Virtual Assistant Apps Wire Business Mobile Device Sports Employer-Employee Relationship Router Unified Threat Management Computers Digital Signature Wi-Fi Workplace Tips Business Continuity Screen Mirroring Botnet Phishing Office Cybercrime Collaboration Accountants Bandwidth Electronic Medical Records Mobile Devices Office 365 Meetings VPN Productivity Google Google Search Mouse Remote Monitoring Social Engineering Mobile Device Management Enterprise Content Management Private Cloud The Internet of Things Windows 7 Help Desk Privacy WiFi Outlook Facebook Managed IT Services Browser Word Data Breach Best Practices HVAC Automation Travel Managed IT Training Spam Blocking User Tips Hackers Online Shopping Google Drive Saving Money Innovation How To Technology Upgrade Network Money BDR Augmented Reality Gadgets Users Password Education Smartphone Windows 10 Operating System Google Docs Update Efficiency Telephone System Keyboard Workers Leadership Network Security Audit Comparison Tech Term Data Recovery Blockchain Disaster Recovery Connectivity Vulnerability VoIP Mobile Computing Hosted Solutions Software Samsung Display Passwords IT Services BYOD Net Neutrality Two-factor Authentication Outsourced IT Human Resources Managed Service Business Intelligence Thought Leadership App Data Backup Communications Staff Hacker Email Cloud Identity Theft Settings Redundancy Malware Artificial Intelligence Windows Scam Marketing Chrome IT Plan Unsupported Software IT Support Fraud Microsoft Software as a Service Big Data Managed IT Services Health Data Security Communication Default App Public Cloud Telephony Smartphones Paperless Office Tip of the Week Windows 10 Quick Tips Internet Exlporer Backup OneNote Hiring/Firing Value Voice over Internet Protocol Internet of Things Save Money Computer Devices Biometric Security Data Protection Access Control Website Proactive IT Machine Learning Data Government Internet Telephone Systems Cryptocurrency Skype Budget Miscellaneous Applications Alert Cloud Computing Cybersecurity Android Content Management Ransomware Social Media Server Law Enforcement Managed Service Provider Security Infrastructure Business Management Encryption Downtime Avoiding Downtime Holiday eWaste Small Business Entertainment CES Hardware Business Computing Servers Networking Bring Your Own Device Microsoft Office

Newsletter Sign Up