fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding the New NIST Guidelines for Password Security

Understanding the New NIST Guidelines for Password Security

The National Institute for Standards and Technology (NIST) has released Special Publication 800-63B, titled Digital Identity Guidelines. The document outlines major changes to the ways password security should be approached and leaves a lot of what network administrators and software developers have implemented recently to be wrong Today, we’ll take a look at the publication, and try to make sense of the sudden change of course.

0 Comments
Continue reading

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Access Control Blockchain Health VPN Processor Microsoft Office Networking IT Services Gadgets Computer Care Cybersecurity Public Cloud Avoiding Downtime Trending Software as a Service Digital Signage Applications IT Support Paperless Office Telephone Systems Sports Information Connectivity Managed IT Services Browser BYOD Malware Server Automation Twitter Business Technology Small Business Telecommuting Human Resources Advertising Fraud Flexibility Tech Term Business Continuity Outsourced IT Internet Government Identity Theft Augmented Reality Mobile Device Management Training Machine Learning Network Windows Server 2008 Social Engineering Telephone System Windows 7 Innovation Cryptocurrency Spam Blocking Software Data Security Quick Tips Data Storage VoIP Email Content Management Mobile Devices Data Protection Word Website Managed Service Amazon Web Services Business Management Smartphones Apps Bandwidth Windows Server 2008 R2 Collaboration Efficiency Bring Your Own Device Private Cloud Camera Facebook Servers IT Consultant Infrastructure User Tips Education MSP Computers Two-factor Authentication Smartphone Data loss Chrome Telephony Operating System Botnet Unsupported Software Upgrade Security Help Desk Microsoft Mobile Device Scam Redundancy Password Windows 10 Patch Management Google Docs Cloud Computing Big Data Net Neutrality IT Management Business Privacy Passwords Android Router Windows Spam Staff Data Breach Best Practices Comparison Remote Monitoring Cables Wi-Fi Managed Services Provider Technology Social Media Backup Communication Google Drive Update Hosted Solutions Alert Google Data OneNote Authentication Workforce Save Money Users Workplace Tips Artificial Intelligence Data Backup Managed IT Services Employer-Employee Relationship Hackers Virtualization Network Security IT Plan BDR Windows 10 How To History Computer User Error Meetings Saving Money Hardware Phishing Gmail Data Recovery Settings Cybercrime Vendor Disaster Recovery Encryption Recovery Project Management Supercomputer 5G Cloud Virtual Assistant Solid State Drive Administrator Holiday Keyboard Internet of Things Google Apps Emails Miscellaneous App Vulnerability Money Voice over Internet Protocol Tip of the week Ransomware Business Intelligence Business Computing Virtual Machine Communications Productivity Google Search Display CES YouTube Managed IT Cortana Office 365 Tip of the Week Password Management Law Enforcement

Newsletter Sign Up