Infracore Blog

Infracore has been providing enterprise-level IT Support for medium sized businesses in and around San Diego, CA since 2003. Time and experience has helped us develop best practices, workflow procedures and a proactive philosophy toward the management of IT departments for our clients.

Understanding the New NIST Guidelines for Password Security

Understanding the New NIST Guidelines for Password Security

The National Institute for Standards and Technology (NIST) has released Special Publication 800-63B, titled Digital Identity Guidelines. The document outlines major changes to the ways password security should be approached and leaves a lot of what network administrators and software developers have implemented recently to be wrong Today, we’ll take a look at the publication, and try to make sense of the sudden change of course.

0 Comments
Continue reading

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

0 Comments
Continue reading

These Innovative Technologies are Helping eBay Move Beyond Passwords

These Innovative Technologies are Helping eBay Move Beyond Passwords

Technology continues to grow more advanced, and with it comes major pain points that need to be resolved. Today’s modern businesses will need to adapt by implementing new solutions for both themselves and their customers or clients. In this fashion, eBay has begun to implement an assortment of new features to assist with the customer experience.

0 Comments
Continue reading

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

0 Comments
Continue reading

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits.

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Business computing Google Microsoft Software Malware Network Security Backup Hackers Innovation Windows 10 Tech Term Internet Data Hardware Email Android Smartphones Hosted Solutions Business VoIP Managed IT Services Small Business Alert Browser Business Continuity Office Mobile Devices Data Backup Ransomware Outsourced IT Computers Disaster Recovery User Tips Business Management Computer Smartphone Cloud Computing Productivity IT Services Efficiency Law Enforcement Cybercrime Miscellaneous Communications Network Productivity Money How To Passwords Artificial Intelligence Router Social Media Telephone Systems Data Recovery Password Collaboration Cybersecurity Facebook Virtualization Chrome Managed IT Services Windows Health Internet of Things App Social Engineering Gadgets Office 365 Communication Quick Tips Upgrade Work/Life Balance HaaS Office Tips Mobile Device Management IT Support Microsoft Office Bring Your Own Device Private Cloud Phishing Hacking Holiday Word Data Protection Wi-Fi IT Support Data Security Applications Google Drive Automation Saving Money Two-factor Authentication Vulnerability Workplace Tips Spam Apps Data Breach Connectivity Windows 10 Computer Care Data Storage VPN Battery Server OneNote PDF Electronic Medical Records Redundancy Samsung IT Management Spam Blocking Paperless Office Remote Computing Avoiding Downtime BDR Information Bandwidth Entertainment Comparison Managed Service Provider Save Money Website CES Government USB Value IT Plan Flexibility Networking Operating System Legal Automobile Employer-Employee Relationship Content Management Public Cloud Unsupported Software Mobility Keyboard Charger Remote Monitoring Managed IT Business Intelligence Patch Management Data Management Blockchain Windows 7 Update End of Support Cleaning Identity Theft Infrastructure Mobile Device History Worker Scam Marketing Big Data BYOD Network Congestion Solid State Drive Flash Criminal Instant Messaging Internet exploMicrosoft Music Credit Cards Inventory Virtual Reality Document Management Password Manager Video Games Audiobook Politics Rootkit Meetings Travel Workforce Transportation Safety Frequently Asked Questions Wireless Charging Devices Employer Employee Relationship Start Menu Trending Cryptocurrency Human Resources How to iPhone Books Assessment IT Consultant Audit Google Docs Servers Advertising Wearable Technology Fraud Access Control Worker Commute Excel Business Mangement Relocation User Error Training Accountants Education Benefits Wireless Internet Cortana Thought Leadership Computer Accessories Tools Safe Mode Staff Black Market Television IT solutions Physical Security Monitor Leadership Computer Fan Sync HVAC Amazon Authentication Tip of the week Machine Learning Gmail Scalability Vendor Management Data loss Telecommuting Managed Service Computing Infrastructure Firewall Wire Google Apps Bluetooth Downtime Specifications Virtual Assistant Emergency Public Computer Save Time The Internet of Things Voice over Internet Protocol Enterprise Content Management Wireless Troubleshooting Loyalty webinar Amazon Web Services Nanotechnology Smart Technology Current Events Windows 10s Windows Server 2008 Recovery YouTube Recycling Humor Internet Exlporer Screen Mirroring Remote Work MSP Practices Sports Workers Addiction Best Practice Files Root Cause Analysis Telephone System Digital Signature HBO Data storage FENG Telephony Password Management Hybrid Cloud SaaS Conferencing Software Tips Online Shopping Smart Tech Two Factor Authentication Knowledge eWaste Information Technology Experience Cast File Sharing Hosted Computing Techology Users Smart Office Cache Content Risk Management Botnet Millennials Encryption Settings Outlook Hiring/Firing Skype Multi-Factor Security NIST HIPAA Search Apple Emails Evernote WiFi Managing Stress Augmented Reality Regulation Thank You Webinar Remote Worker Congratulations CrashOverride Wiring Twitter Company Culture Compliance

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

JeffereyANoah 5 Useful Cloud Apps for Small Businesses
15 August 2018
Sharing these type stuff is very useful and hope you will provide us more like this one. I come here...
Jared Albert VoIP Delivers Benefits That a Traditional Phone System Can’t
13 August 2018
A traditional telephone system is installed for the happiness of the people. Majority of the concern...
Meredith Maddox Tip of the Week: Tip of the Week: Mirror or Cast Your Android Device’s Screen
08 August 2018
Android mobile phones are top of the list now a days every one wants to buy android phone. It’s a bi...
MarianneJCruz Tip of the Week: Got a Solid State Drive? Here’s How to Take Care of It
31 July 2018
What a review https://www.uk.com/how-do-you-do.html
Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.