Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding the New NIST Guidelines for Password Security

Understanding the New NIST Guidelines for Password Security

The National Institute for Standards and Technology (NIST) has released Special Publication 800-63B, titled Digital Identity Guidelines. The document outlines major changes to the ways password security should be approached and leaves a lot of what network administrators and software developers have implemented recently to be wrong Today, we’ll take a look at the publication, and try to make sense of the sudden change of course.

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Malware Hosted Solutions Backup Microsoft Network Security Software Data Internet Windows 10 Innovation User Tips Mobile Devices Smartphones Email Browser Hardware Business Efficiency Tech Term VoIP Productivity Computer Business Continuity Disaster Recovery Smartphone IT Services Workplace Tips Ransomware Miscellaneous Data Backup Productivity Cybercrime Business Management communications Android Automation Windows Outsourced IT Network Cloud Computing Alert Office Data Recovery Chrome Artificial Intelligence Save Money Upgrade Computers Server Router Managed IT Services Telephone Systems Managed IT Services Internet of Things Communication Virtualization Social Media Windows 10 Small Business Quick Tips Facebook Cybersecurity Collaboration Money Law Enforcement Wi-Fi Passwords IT Support App Password Office 365 Spam Social Engineering Health How To Holiday Applications Office Tips Google Drive BDR Two-factor Authentication Bandwidth Gadgets Bring Your Own Device Gmail Mobile Device Operating System Mobile Device Management Settings History Word Work/Life Balance Information Remote Computing Scam Safety Microsoft Office Networking Managed Service Data Protection Sports Mobility Encryption Apps Connectivity Data Management Application Voice over Internet Protocol Vulnerability Recovery VPN Keyboard Private Cloud Data Breach HaaS Hacking Phishing Mouse Managed Service Provider Data Security Entertainment Marketing Flexibility CES User Error Training Identity Theft Paperless Office PDF IT Plan Website Telephony Infrastructure Remote Monitoring Virtual Assistant Social Windows 7 Managed IT Content Management Wearable Technology Cleaning Budget Business Intelligence Machine Learning Unsupported Software Big Data Electronic Medical Records Update Telephone System Legal Battery OneNote Botnet Blockchain Black Market Charger Fraud Software as a Service Meetings Access Control Saving Money YouTube Redundancy Firewall Employer-Employee Relationship eWaste BYOD Government Public Cloud Hiring/Firing Data Storage The Internet of Things Avoiding Downtime Human Resources Internet Exlporer Downtime IT Support Patch Management Mobile Computing Servers Comparison Best Practice Retail IT Management Google Docs DDoS Physical Security USB Robot Spam Blocking End of Support Data storage Apple FENG IT Consultant Value HVAC Uninterrupted Power Supply HBO Specifications Smart Tech Bing People Computer Accessories Hosted Computing Warranty Distributed Denial of Service Wireless Technology Instant Messaging Troubleshooting Windows 10s Supercomputer Internet exploMicrosoft Users Data loss Conferencing Remote Worker Monitor Politics Television Evernote Cache Security Cameras iPhone Programming Transportation Biometrics Samsung Enterprise Content Management Vendor Management Outlook Credit Cards Help Desk Password Manager Mobile Office Information Technology Bluetooth Inventory Printer Chromecast Relocation Customer Relationship Management Skype Notifications Advertising Virtual Reality Screen Mirroring Emails Digital Signature Wiring Reputation Public Computer Flash Wireless Charging Wireless Internet Hacker Benefits Leadership Password Management Tech Support Techology Content Frequently Asked Questions Millennials Devices Start Menu Business Mangement Going Green Software Tips Multi-Factor Security Administrator Humor Books Customer Service Solid State Drive Current Events Smartwatch Worker Commute Save Time Shortcut Cast Computer Care Accountants Unified Threat Management Customers Experience Social Networking Cortana Wire Files Education Travel HIPAA NIST MSP Running Cable Shadow IT Audiobook SaaS Excel Workforce Amazon Thought Leadership Shortcuts Fax Server Audit Knowledge Tools Recycling Laptop Wireless Worker IT solutions Trending Authentication Microchip Streaming Media Search Emergency WiFi Camera Video Games Music Automobile Sync Google Apps Smart Office Computing Infrastructure Smart Technology Root Cause Analysis Cryptocurrency File Sharing Tip of the week Telecommuting Amazon Web Services Vendor Lithium-ion battery How to Computer Fan Network Congestion Criminal Environment Touchpad Rootkit Remote Work Nanotechnology Search Engine Hybrid Cloud Employer Employee Relationship Netflix Practices NarrowBand Scalability IBM Workers Document Management Two Factor Authentication Maintenance webinar Staff Safe Mode Augmented Reality Risk Management Assessment Windows Server 2008 Online Shopping Addiction Display Congratulations Company Culture Webinar Compliance CrashOverride Managing Stress IT solutions Regulation Twitter Printers Thank You
QR-Code