Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding the New NIST Guidelines for Password Security

Understanding the New NIST Guidelines for Password Security

The National Institute for Standards and Technology (NIST) has released Special Publication 800-63B, titled Digital Identity Guidelines. The document outlines major changes to the ways password security should be approached and leaves a lot of what network administrators and software developers have implemented recently to be wrong Today, we’ll take a look at the publication, and try to make sense of the sudden change of course.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Hosted Solutions Backup Malware Microsoft Network Security Software Windows 10 Innovation User Tips Mobile Devices Data Internet Smartphones Email Browser Business Hardware Tech Term Efficiency Business Continuity Productivity Smartphone Computer VoIP Disaster Recovery IT Services Ransomware Workplace Tips Miscellaneous Data Backup Business Management communications Android Productivity Cybercrime Outsourced IT Automation Network Cloud Computing Chrome Alert Windows Office Data Recovery Save Money Telephone Systems Computers Managed IT Services Upgrade Router Internet of Things Server Managed IT Services Artificial Intelligence Communication Collaboration Social Media Windows 10 Small Business Quick Tips Money Law Enforcement Virtualization Cybersecurity Facebook Social Engineering Holiday Spam IT Support Office Tips Health Passwords Office 365 How To App Applications Wi-Fi Password Gadgets Bring Your Own Device Gmail Operating System Mobile Device Management Work/Life Balance Settings Mobile Device Two-factor Authentication Information BDR Word Google Drive History Remote Computing Bandwidth Networking Voice over Internet Protocol Vulnerability Phishing Application Private Cloud Recovery HaaS Entertainment Microsoft Office Scam Hacking Marketing Managed Service Sports Flexibility Encryption Data Protection Data Security Keyboard Safety Data Management Mouse Managed Service Provider Connectivity VPN Mobility Apps Data Breach Blockchain Meetings IT Plan Website Fraud Telephony Firewall Employer-Employee Relationship Remote Monitoring Access Control YouTube Windows 7 Legal Battery Business Intelligence Social Black Market Managed IT Hiring/Firing eWaste Unsupported Software Budget Update The Internet of Things Patch Management Internet Exlporer USB OneNote Botnet Human Resources Government Training Software as a Service Public Cloud DDoS Redundancy Saving Money Servers Best Practice Downtime IT Support User Error BYOD Data Storage Identity Theft CES Physical Security End of Support Big Data Infrastructure Paperless Office Data storage Avoiding Downtime Virtual Assistant Wearable Technology Cleaning Comparison Electronic Medical Records IT Management Google Docs Charger PDF Spam Blocking Mobile Computing Content Management Retail Robot Machine Learning Telephone System Password Management Relocation Audiobook SaaS Display Devices Information Technology Windows 10s Augmented Reality Data loss Worker Bing Advertising Virtual Reality Emergency Knowledge Business Mangement Reputation Warranty Accountants Running Cable Shadow IT Outlook Music Automobile Cortana Wire Techology Biometrics HIPAA NIST Humor Security Cameras Amazon Thought Leadership Going Green Streaming Media Skype Smart Technology Remote Worker Programming Screen Mirroring Rootkit Help Desk Authentication Worker Commute Flash Network Congestion Customer Relationship Management Recycling Customers Employer Employee Relationship Netflix Printer Files Education Frequently Asked Questions Millennials IBM Google Apps Smart Office Lithium-ion battery Cryptocurrency Environment Search Software Tips Multi-Factor Security Risk Management Assessment Hacker Amazon Web Services Laptop Wireless Solid State Drive Start Menu Two Factor Authentication webinar Wiring Cast Computer Care Remote Work Nanotechnology NarrowBand IT Consultant Customer Service Criminal Video Games Computer Accessories Administrator Shortcut Practices Computing Infrastructure Excel Workforce Troubleshooting Supercomputer Social Networking Workers Document Management Travel Staff Safe Mode How to Uninterrupted Power Supply Trending Politics Television Smartwatch Online Shopping Addiction Touchpad Audit Tools Conferencing Unified Threat Management Scalability WiFi Vendor Management Shortcuts IT solutions Smart Tech Hybrid Cloud Distributed Denial of Service Wireless Technology Sync Transportation Samsung MSP Fax Server HVAC People Bluetooth Microchip Hosted Computing Tip of the week Telecommuting Root Cause Analysis Apple Public Computer Evernote Cache Computer Fan Emails Camera Mobile Office Instant Messaging Content Vendor Credit Cards Chromecast Benefits Leadership File Sharing Enterprise Content Management Search Engine Inventory Internet exploMicrosoft Users Windows Server 2008 Books Current Events Password Manager Monitor Notifications Maintenance Digital Signature iPhone Tech Support HBO Specifications Experience Wireless Charging Wireless Internet FENG Value Save Time Congratulations Company Culture Compliance IT solutions Managing Stress Regulation Twitter CrashOverride Thank You Printers Webinar
QR-Code