Contact Us! 469-272-0777

LiveZilla Live Help

AspireTech Blog

AspireTech has been serving the Mansfield area since 1999 , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding the New NIST Guidelines for Password Security

Understanding the New NIST Guidelines for Password Security

The National Institute for Standards and Technology (NIST) has released Special Publication 800-63B, titled Digital Identity Guidelines. The document outlines major changes to the ways password security should be approached and leaves a lot of what network administrators and software developers have implemented recently to be wrong Today, we’ll take a look at the publication, and try to make sense of the sudden change of course.

Continue reading

Mobile? Grab this Article!


Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Network Security Privacy Hosted Solutions Hackers Email Innovation Malware Mobile Devices Internet Backup Efficiency VoIP Google Microsoft Workplace Tips Productivity Data Backup Data IT Services communications Software Hardware Business User Tips Data Recovery IT Support Outsourced IT Smartphones Cybersecurity Disaster Recovery Productivity Managed IT Services Phishing Internet of Things Business Continuity Communication Android Cloud Computing Upgrade Miscellaneous Computer Managed IT Services Network Small Business Server Gadgets Browser Saving Money Business Management Tech Term Collaboration Smartphone Artificial Intelligence Ransomware Windows 10 IT Support Windows BDR Chrome Users Social Media Save Money Cybercrime Mobile Device Windows 10 Automation Computers Mobility Holiday Passwords Bandwidth BYOD Microsoft Office Virtualization Training Office 365 Windows 7 Employer-Employee Relationship Spam Telephone Systems Quick Tips Facebook Managed IT Social Engineering Mobile Device Management Operating System Encryption Managed Service Provider Networking Remote Monitoring Recovery Avoiding Downtime Information Information Technology Blockchain Applications Firewall Office Two-factor Authentication Data Breach Mobile Computing History Router Data Security How To Managed Service Patch Management Alert Wi-Fi Business Intelligence Money App Access Control Word Data Protection Compliance Website Wireless Paperless Office Application Servers Business Technology Gmail VPN Mouse Software as a Service Settings Proactive IT Hacking Redundancy Telephone System Big Data Help Desk Private Cloud Identity Theft Downtime Data Storage Data Management Virtual Private Network Lithium-ion battery Health Staff Vulnerability WiFi Meetings Bring Your Own Device Remote Computing User Error Display Budget Marketing Hacker Infrastructure IT Management Risk Management Analysis Document Management Google Drive Office Tips Human Resources File Sharing Sports Connectivity Government The Internet of Things Law Enforcement Vendor Management Apps Machine Learning Manufacturing Managed Services Provider Education Voice over Internet Protocol Solid State Drive Network Congestion Wireless Technology Apple Cleaning Processor Credit Cards Professional Services eWaste Data storage Vendor IT solutions Virtual Reality Scam Streaming Media Project Management Fraud Value Windows Server 2008 Entertainment Shadow IT Password Social Business Owner Cryptocurrency USB Workers Botnet Employee/Employer Relationship Internet Exlporer Augmented Reality Biometrics Comparison Humor IT Plan Save Time DDoS Unsupported Software Public Cloud Robot Work/Life Balance OneNote Safety Healthcare Digital Signage Retail Virtual Assistant GDPR Saving Time Telephony Update Smart Tech Running Cable Keyboard Data loss SaaS CES YouTube Black Market Fax Server Cables Google Docs Content Management Spam Blocking Environment Content Filtering HaaS Hard Drives Uninterrupted Power Supply Development Printers Windows Server 2008 R2 Addiction Computer Care Frequently Asked Questions Conferencing Mobile Windows 10s eCommerce Bitcoin Excel Theft Enterprise Content Management Proactive 5G Managing Stress Multi-Factor Security Hosted Computing Computing Infrastructure File Versioning Trend Micro Memory Messaging Mobile Office Chromecast Cache Samsung Tip of the week Batteries Virtual Desktop Cortana Password Management Remote Monitoring and Maintenance OLED Trending Inventory Multiple Versions Shopping Tech Support SMS Hard Drive Wireless Internet Tools Digital Signature Audit Outlook Remote Workers Google Apps NIST Line of Business Cabling Bluetooth Bloatware Lifestyle Transportation Data Warehousing End of Support Restore Data Social Network Warranty Azure Amazon Wire Strategy Computer Fan Wearable Technology Monitor Security Cameras Managed IT Service MSP Default App Entrepreneur Authentication Internet exploMicrosoft Backup and Disaster Recovery Printing Legal Going Green Printer RMM Amazon Web Services Smart Office Regulations FENG Business Analytics Maintenance Password Manager Safe Mode Proactive Maintenance Nanotechnology Advertising Cryptomining Personal Laptop Administrator Smart Devices Social Networking Online Shopping Current Events Travel Accountants Relocation Smartwatch Using Data Science Business Mangement Remote Worker Remote Maintenance Specifications Electronic Medical Records Notifications Database Business Cost Emails SharePoint Touchpad Microchip Virtual Machine Evernote Students Knowledge Flash Distributed Denial of Service Employee Window 10 Windows 8 Shortcut Recycling Wiring IT Infrastructure Millennials Devices Software Tips PDF Digitize Instant Messaging Webinar Search Engine Hypervisor Customer Relationship Management Wireless Charging IT Consultant Sync WIndows 7 IoT HIPAA Root Cause Analysis Operations Tablet Criminal Distribution IT Assessment Investment Programming Workforce Thought Leadership Physical Security Best Practice IT solutions Antivirus Bing Customer Service Fiber-Optic Electronic Health Records Leadership Logistics iPhone Google Search Projects OneDrive IT service E-Commerce ROI Telecommuting Content Filter Charger Procurement Consultant Skype Analyitcs Insurance Hosted Solution Screen Mirroring IaaS Files Net Neutrality Computing Tablets Copiers Domains NarrowBand Camera Remote Work Storage Unified Threat Management HBO Start Menu Shortcuts Employee/Employer Relationships Unified Communications HVAC Best Available webinar Biometric Security User Practices Cast Colocation ISP Fiber Optics