fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding the New NIST Guidelines for Password Security

Understanding the New NIST Guidelines for Password Security

The National Institute for Standards and Technology (NIST) has released Special Publication 800-63B, titled Digital Identity Guidelines. The document outlines major changes to the ways password security should be approached and leaves a lot of what network administrators and software developers have implemented recently to be wrong Today, we’ll take a look at the publication, and try to make sense of the sudden change of course.

0 Comments
Continue reading

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Business Computing Network Congestion Staff Managed IT Services Data Breach Business Continuity Apps Emergency Telecommuting Business VPN Botnet Applications Smartphone Paperless Office Windows 10 Google Apps Hackers Infrastructure VoIP Computers Android Office 365 Mobile Device Management Automation Internet Collaboration Holiday File Sharing OneNote Amazon Smart Tech How To Microchip Advertising Alert Wi-Fi Email Gadgets Update BDR Network Security Meetings Mobile Devices Millennials USB Spam Addiction Outsourced IT Cybercrime Upgrade IT Plan YouTube Tech Term Data Entertainment Security Cameras User Tips Two-factor Authentication Cloud Facebook Data Protection Multi-Factor Security Mobile Device Windows 10 Operating System Private Cloud Emails Data Recovery Company Culture Router Windows 7 Google Docs Bring Your Own Device Workplace Tips Social Engineering Sync Virtual Assistant Best Practices Cortana Excel Cleaning Cloud Computing Software Data Security Disaster Recovery Shortcuts Workforce Telephone Systems Encryption Fraud Phishing Password Management Business Mangement Technology Efficiency Firewall Windows Social Media Smartphones Internet exploMicrosoft Spam Blocking Comparison CES Authentication Money Recovery Managed IT Services Software as a Service Voice over Internet Protocol Employer-Employee Relationship User Error Hardware Word IT Support Machine Learning Content Management Microsoft Backup Managed Service Data Storage Innovation Small Business Smart Office Save Money Productivity IT Services Vulnerability Settings Practices Connectivity Password Miscellaneous MSP Redundancy Scam Computer Access Control Communications Online Administrator Cybersecurity Ransomware Identity Theft Gmail Blockchain Malware Tip of the Week Networking Government Server Website Chrome Solid State Drive Network Internet of Things Managed IT Wireless Charging Microsoft Office Security Passwords Tip of the week NIST Telephony Browser Conferencing Data Backup Artificial Intelligence Business Intelligence Privacy Bandwidth Saving Money Camera Human Resources Keyboard Physical Security Public Cloud Google Drive Data Management Telephone System Business Management Nanotechnology Communication Law Enforcement Avoiding Downtime IT Consultant Twitter Unsupported Software IT Management Remote Monitoring Virtualization App Information Servers BYOD Legal Google Sports Hosted Solutions Computer Care

Newsletter Sign Up