fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding the New NIST Guidelines for Password Security

Understanding the New NIST Guidelines for Password Security

The National Institute for Standards and Technology (NIST) has released Special Publication 800-63B, titled Digital Identity Guidelines. The document outlines major changes to the ways password security should be approached and leaves a lot of what network administrators and software developers have implemented recently to be wrong Today, we’ll take a look at the publication, and try to make sense of the sudden change of course.

0 Comments
Continue reading

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Evernote CES Paperless Office Business Continuity BYOD Technology Google Drive Holiday Social Media Managed IT VPN Frequently Asked Questions Firewall Ransomware Staff Network Vendor Management Server Wi-Fi Microsoft Settings Inventory Data Recovery Servers GDPR Private Cloud Save Money Bandwidth IT Support Cybersecurity Passwords BDR Cables Password Scam Files Mobile Devices Cast FENG Software as a Service Update Current Events Cache Bring Your Own Device Employer-Employee Relationship Connectivity App Start Menu Communication Voice over Internet Protocol Google Spam Blocking Innovation Office 365 Chrome Digital Signage Hackers Email Budget Avoiding Downtime Apps Machine Learning Tech Term Root Cause Analysis Hardware Business Management Managed Service Workplace Tips Redundancy Specifications Apple Telephone Systems Business Computing Efficiency Computer Vendor Cybercrime Cryptocurrency Windows 7 Data Breach Augmented Reality Internet of Things Meetings Education Remote Computing Help Desk Quick Tips Flash Criminal Blockchain Virtual Assistant Fraud Training Operating System Network Security End of Support Database Windows Alert Net Neutrality Business Intelligence Malware Managed IT Services IT Plan Communications Remote Monitoring Law Enforcement Relocation Botnet Sports Upgrade Productivity HaaS Government Encryption Automation Two-factor Authentication Router Data Security Money User Tips Smartphone Cloud Computing Microsoft Office Hosted Solutions Website Mobile Device Telephony Content Management OneNote Saving Money Disaster Recovery Cloud Tip of the Week Applications IT Management Warranty Data Storage Gadgets Privacy Display Processor Title II Access Control Collaboration Hybrid Cloud Comparison Phishing Keyboard Backup VoIP Hacker Wiring Software Identity Theft Users Business Health Password Manager HIPAA Small Business Best Practices Social Engineering IT Services Facebook Outsourced IT Data Backup Vulnerability Productivity Spam Windows 10 Netflix Miscellaneous The Internet of Things Data Protection Android How To Word Marketing Infrastructure Managed IT Services Virtualization Smartphones Google Docs Telephone System Information Computers Mobile Device Management Internet Emergency Browser Data Security Human Resources Windows 10 Networking Unsupported Software Public Cloud Artificial Intelligence Credit Cards

Newsletter Sign Up