Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding the New NIST Guidelines for Password Security

Understanding the New NIST Guidelines for Password Security

The National Institute for Standards and Technology (NIST) has released Special Publication 800-63B, titled Digital Identity Guidelines. The document outlines major changes to the ways password security should be approached and leaves a lot of what network administrators and software developers have implemented recently to be wrong Today, we’ll take a look at the publication, and try to make sense of the sudden change of course.

0 Comments
Continue reading

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

0 Comments
Continue reading

These Innovative Technologies are Helping eBay Move Beyond Passwords

These Innovative Technologies are Helping eBay Move Beyond Passwords

Technology continues to grow more advanced, and with it comes major pain points that need to be resolved. Today’s modern businesses will need to adapt by implementing new solutions for both themselves and their customers or clients. In this fashion, eBay has begun to implement an assortment of new features to assist with the customer experience.

0 Comments
Continue reading

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

0 Comments
Continue reading

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Malware Hosted Solutions Backup Microsoft Data Internet Windows 10 Innovation User Tips Network Security Mobile Devices Software Smartphones Business Email Hardware Browser Efficiency Tech Term VoIP Productivity Computer Business Continuity Smartphone Disaster Recovery Data Backup Workplace Tips Ransomware Miscellaneous IT Services Productivity Cybercrime communications Business Management Android Cloud Computing Windows Alert Data Recovery Network Outsourced IT Office Chrome Automation Upgrade Communication Server Telephone Systems Artificial Intelligence Computers Managed IT Services Router Managed IT Services Save Money Money Small Business Quick Tips Law Enforcement Facebook Collaboration Windows 10 Internet of Things Virtualization Social Media Holiday Spam Applications IT Support Wi-Fi Social Engineering Health Office 365 Password Cybersecurity Office Tips Passwords App How To Information Word Work/Life Balance Two-factor Authentication Bandwidth Bring Your Own Device Gadgets Gmail Google Drive Operating System Mobile Device Management Settings BDR History Remote Computing Mobile Device Phishing Hacking Application Data Security Data Management VPN Recovery Managed Service Flexibility Microsoft Office Data Protection Scam Connectivity Safety Mobility Vulnerability Apps Voice over Internet Protocol Keyboard Entertainment Mouse Managed Service Provider Marketing Data Breach Private Cloud HaaS Networking Sports Encryption Cleaning Avoiding Downtime Budget Public Cloud Wearable Technology Downtime IT Support Comparison Patch Management Identity Theft IT Management Google Docs CES USB Software as a Service Spam Blocking Physical Security Infrastructure Paperless Office Data storage Training End of Support Meetings Virtual Assistant Saving Money Telephony YouTube IT Plan Website Content Management Remote Monitoring Machine Learning PDF Windows 7 Managed IT Business Intelligence eWaste Telephone System Fraud The Internet of Things Unsupported Software Blockchain Big Data Access Control Internet Exlporer Electronic Medical Records Update Mobile Computing Legal OneNote Botnet Charger Black Market DDoS Retail Battery Best Practice Robot Redundancy User Error Firewall Employer-Employee Relationship BYOD Human Resources Hiring/Firing Government Data Storage Servers Social Practices Smart Technology Programming Biometrics Video Games Root Cause Analysis Workers Document Management Printer Tip of the week Telecommuting Computer Fan Online Shopping Addiction Chromecast Rootkit Wiring Computing Infrastructure Mobile Office Staff Safe Mode Network Congestion Customer Relationship Management Hacker Smart Tech Employer Employee Relationship Netflix How to Notifications HVAC IBM Touchpad Hosted Computing Tech Support Two Factor Authentication webinar Scalability Risk Management Assessment Administrator Hybrid Cloud Windows Server 2008 FENG Value Evernote Cache Unified Threat Management HBO Specifications IT Consultant Customer Service Windows 10s Credit Cards Computer Accessories Shortcut MSP Apple Troubleshooting Enterprise Content Management Supercomputer Social Networking Shortcuts Running Cable Inventory Shadow IT Conferencing Instant Messaging Data loss Password Manager Politics Television Microchip Monitor Wireless Charging Streaming Media Wireless Internet Vendor Management IT solutions Camera Internet exploMicrosoft Users Outlook Digital Signature Transportation Samsung Fax Server Skype Devices Bluetooth File Sharing iPhone Password Management Vendor Emails Relocation Screen Mirroring Business Mangement Lithium-ion battery Public Computer Search Engine Information Technology Flash Reputation Cortana Content Wire Advertising Virtual Reality Frequently Asked Questions Millennials Environment Accountants Benefits Leadership Techology Solid State Drive Start Menu Amazon Thought Leadership NarrowBand Augmented Reality Software Tips Multi-Factor Security HIPAA Books NIST Current Events Display Authentication Save Time Maintenance Humor Cast Computer Care Recycling Experience Bing Going Green Customers Travel Google Apps Audiobook Smart Office SaaS Warranty Worker Commute Excel Workforce Uninterrupted Power Supply Audit Tools Amazon Web Services Distributed Denial of Service Wireless Technology Worker Remote Worker Files Education Trending People Emergency Cryptocurrency Knowledge Security Cameras Remote Work Nanotechnology Search WiFi Criminal Music Automobile Help Desk Laptop Wireless Sync Smartwatch Company Culture Printers Compliance Thank You Webinar Managing Stress CrashOverride Regulation Twitter Congratulations IT solutions
QR-Code