• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Microsoft Authenticator Password

Microsoft Releases Password Generation in Authenticator

May 3, 2022 Zachary Comeau Leave a Comment

Microsoft has released the availability of a strong password generator in Microsoft Authenticator, giving the authentication tool’s 75 million-plus active users the ability to generate a strong, random password. Microsoft Authenticator currently provides passwordless authentication, push notifications, time-based one-time passwords and security alerts in addition to autofill passwords and other features. While the IT community […]

Read More

Microsoft Security RSA Conference

Microsoft Defender For Business Is Now Generally Available

May 2, 2022 Zachary Comeau Leave a Comment

Microsoft is launching the general availability of the stand-alone version of Microsoft Defender for Business, a new offering designed for small-to-mid-sized businesses that brings enterprise-grade endpoint security, detection and response to smaller organizations. According to Microsoft, this is designed to provide protection against ransomware and other sophisticated cyberattacks for SMBs, who say cyberthreats are becoming […]

Read More

Shadow IT Remote Work

Is a Reliance on Cloud, SaaS Apps Leading to Shadow IT?

April 29, 2022 Zachary Comeau Leave a Comment

A new report finds that the ongoing distributed work experiment and expanding use of enterprise technology is leading to IT management blind spots and shadow IT at more than 70% of organizations. According to enterprise technology management solutions provider Oomnitza, which surveyed IT leaders from 100 enterprises of more than 5,000 employees across the U.S., […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

12 Threat Detection Trends IT Pros Should Know

April 29, 2022 TD Staff Leave a Comment

Red Canary, the Denver-based managed detection and response (MDR) provider performed an analysis of emerging and significant trends that its cybersecurity team encountered over the past year. Its annual 2022 Threat Detection Report covers the most prominent trends of 2021 and shows major themes that may prelude into 2022. Last year,  ransomware groups (Sodinokibi/REvil, BlackMatter, […]

Read More

Hybrid Work security

The Great Resignation and Hybrid Work are Changing the Security Landscape

April 29, 2022 Jimmy Chang Leave a Comment

Record numbers of Americans are quitting their jobs in what many are now calling the “Great Resignation.” Remaining employees who have had an opportunity to prove their value and ability to work productively from anywhere are placing intense pressure on their employers to support a remote/hybrid work environment. Gartner recently stated that “51% of global knowledge workers will be […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Make Sure These 15 Most Exploited Vulnerabilities From 2021 Are Patched

April 28, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with a coalition of U.S. and foreign security and law enforcement agencies, have released a list of the 15 most exploited vulnerabilities from 2021, calling on both public and private organizations to ensure these critical security bugs are mitigated and systems patched. The list, published in a […]

Read More

television tv stream smart broadcast video network

What to Look for in a Reliable Device Management Software

April 28, 2022 Nadav Avni Leave a Comment

For phone service companies—or “telcos”—aiming to expand their value-added services, maintaining a fleet of smart TVs and other devices is a given. The challenge became getting the right device management software to manage these smart devices properly. Meanwhile, not all electronics manufacturers who joined the smart TV bandwagon recognized the importance of developing their own […]

Read More

Atera ESET Integration

Microsoft Unveils New Antimalware Engine Capabilities for Linux and macOS

April 27, 2022 TD Staff Leave a Comment

Microsoft announced an upgrade to its next generation of protection on Linux and MacOs with a new Microsoft Defender Antivirus malware engine. The new antimalware engine brings machine learning, big-data analysis, in-depth threat research, and the Microsoft cloud infrastructure to protect devices (or endpoints) within organizations. The new antimalware engine in Microsoft Defender is currently […]

Read More

Microsoft 365 Account Switching

Microsoft 365 Web App Account Switching Feature Rolling Out

April 27, 2022 Zachary Comeau Leave a Comment

Microsoft will be rolling out a new account switching feature for Microsoft 365 web apps that eliminates the need for workarounds to use multiple Azure Active Directory and personal Microsoft accounts while using any web apps. According to Microsoft, users will be able to sign into multiple accounts in the same browser and easily switch […]

Read More

insider threats, military document leak, Jack Teixeira, insider risk

Insiders Pose Cybersecurity Threat to Healthcare

April 26, 2022 TD Staff Leave a Comment

The U.S. Department of Health and Human Services (HHS) Cybersecurity Program Office of Information Security warned healthcare facilities on Thursday about vulnerabilities to insider threats. HHS cited a 2020 study from Ponomon, which found that 61% of data breaches involving an insider are primarily unintentional, caused by negligent insiders. Nearly 14% of breaches, however, are […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 26
  • Page 27
  • Page 28
  • Page 29
  • Page 30
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.