• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Microsoft Apple macOS bug

Apple to Introduce Lockdown Mode to Help Protect Against Spyware

July 7, 2022 Zachary Comeau Leave a Comment

Apple is previewing Lockdown Mode, a new security capability coming this fall with a slate of new operating systems designed to harden device defenses and severely limit functionalities of devices that could be exploited by sophisticated spyware, such as solutions from NSO Group and other private spyware providers. According to Apple, Lockdown Mode is intended […]

Read More

Cybersecurity Board

Cyber Literacy Test: 7 Questions to Ask Your Board to Reduce Risk and Educate Leaders in the Age of Attacks

July 7, 2022 Naveen Bhateja Leave a Comment

As corporations consider their cybersecurity weaknesses, the focus often falls on unsecured networks, outdated systems, or a lack of monitoring designed to detect attacks. One area that is rarely identified, but that can significantly threaten a corporation’s ability to prevent, manage, and respond to cyber attacks, is the cyber literacy of the corporation’s board. Every […]

Read More

PowerShell Cybersecurity

How to Secure PowerShell and Use it for Cybersecurity Defense

July 6, 2022 Zachary Comeau Leave a Comment

PowerShell is an incredibly effective tool that allows IT administrators to automate repetitive tasks and is particularly useful in helping to protect and manage the cybersecurity of Windows operating systems. However, those same capabilities are just as useful for hackers after gaining initial access to a network,  with PowerShell scripts being used to weaken intrusion […]

Read More

Quantum computer technology concept

How Organizations Can Become Early Adopters of Quantum Computing

July 6, 2022 TD Staff Leave a Comment

My TechDecisions asked Robert Liscouski, president and CEO of Quantum Computing, Inc., all about quantum computing and how organizations can harness its advanced computing power before it reaches full maturity. Here’s what Liscouski had to say: Q: What is the state of quantum computing in the enterprise? Liscouski: There is no question that quantum computing […]

Read More

GoTo Resolve Mirador

GoTo to Add New Mobile Device Management Capabilities With Miradore Acquisition

July 6, 2022 Zachary Comeau Leave a Comment

Business communications and IT management software company GoTo is acquiring cloud-based device management firm Miradore to add new mobile device management capabilities to the GoTo Resolve IT support platform. According to Boston-based GoTo, the move reinforces the company’s vision as a one-stop-shop for IT management needs for small and medium-sized businesses (SMBs), with Miradore’s purpose-built […]

Read More

Beyond Identity

Research: Only 28% of SMBs Require MFA

July 6, 2022 Zachary Comeau Leave a Comment

The majority of small and medium-sized businesses (SMBs) are not leveraging multi-factor authentication (MFA) and are relying only on usernames and passwords to secure their data, according to a new study from the Cyber Readiness Institute. According to the organization’s Global Small Business Multi-Factor Authentication Study of 1,403 small and medium-sized businesses across eight countries, […]

Read More

MIcrosoft Entra External ID

Prepare: Microsoft Begins Disabling Basic Auth in Exchange Online Oct. 1

June 30, 2022 Zachary Comeau Leave a Comment

Microsoft and U.S. cybersecurity officials renewing calls for organizations to switch from Basic Authentication (Basic Auth) in Microsoft Exchange Online to Modern Authentication before the company begins to disable Basic Auth in October. Microsoft on Oct. 1 will begin turning off the ability to use Basic Auth in Exchange Online for Exchange ActiveSync (EAS), POP, […]

Read More

Microsoft 365 domain, cloud.microsoft

Microsoft Rolling Out Idle Session Timeout for Microsoft 365 Web Apps

June 29, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing a new feature that will automatically log users out of Microsoft 365 web apps after a period of inactivity, helping admins protect the organization’s data when users log on from unmanaged shared or personal devices. According to Microsoft, the idle session timeout feature for web apps allows admins to configure a tenant-wide […]

Read More

Cyber technology security lock on screen, network protection

Why Security Technology Convergence is Crucial to Future-Proofing the Workplace

June 28, 2022 Andi Krebs Leave a Comment

Today’s commercial technology stacks are increasingly leveraging IoT and the cloud to make managing businesses more efficient: people are more reliant on technology in order to use, access, and manage their offices. This trend holds true for workplace security systems, too. Now, we’re seeing higher mobile credential adoption for commercial access control systems, increased migration […]

Read More

1Password Browser Extension

Microsoft Releases Temporary Access Pass For Time-Limited Passcodes

June 24, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing the general availability of Temporary Access Pass, a time-limited passcode that allows users to register passwordless authentication methods and recover access to accounts without a password. According to Microsoft, Temporary Access Pass (TAP) can also be used to set up Windows devices whether users are directly setting up their own devices or […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 21
  • Page 22
  • Page 23
  • Page 24
  • Page 25
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.