• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
zoom chat leader, Enterprise Sound Bar Collaboration Kit, videoconferencing, cybersecurity

Must-Have Cybersecurity Features for Videoconferencing

March 30, 2022 TD Staff Leave a Comment

George Waller, EVP and co-founder of StrikeForce Technologies, an entrepreneur and technologist with over two decades in the cybersecurity and computer industries offers insights into must have cybersecurity features for videoconferencing and how we should be thinking about meetings in the future. Q: What are the top cybersecurity and data privacy concerns with general purpose […]

Read More

Does Remote Work Destroy Company Culture?

March 30, 2022 TD Staff Leave a Comment

Feelings of inclusion and diversity have improved in the era of hybrid work, according to a MIT Sloan Management Review and Webex by Cisco study. At least 56% of Generation Z, 52% of millennials, 45% of Generation X and 35% of Baby Boomers say that diversity and inclusion has improved with the advent of remote […]

Read More

Metaverse Cybersecurity

Interested in the Metaverse? Prioritize Cybersecurity, Microsoft Says.

March 30, 2022 Zachary Comeau Leave a Comment

As Big Tech firms begin to dive head first into the metaverse, Microsoft is urging the industry to make cybersecurity a priority and establish core security principles before the emerging technology becomes too advanced and vulnerable to exploitation. In a blog post, Charlie Bell, the company’s executive vice president of security, compliance, identity and management, […]

Read More

School Software Implementation

Why Schools Should Implement New K-12 Software in the Winter

March 30, 2022 Matt Muller Leave a Comment

There’s no question that implementing new software in education environments is daunting. From uploading new student rosters to educating teachers across a district how to use new software, there’s a lot of work that goes into ensuring a successful software implementation. In fact, in a recent research study, the EdTech Genome Product—a collaborative effort involving […]

Read More

IE Mode MIcrosoft Edge

Microsoft Makes Two Key Improvements to IE Mode in Edge

March 29, 2022 Zachary Comeau Leave a Comment

With the death of Internet Explorer less than three months away, Microsoft says it has made two key enhancements to the Internet Explorer (IE) mode in Microsoft Edge designed to keep apps and workflows using the browser operational and share information between modern and legacy sites. Internet Explorer will retire and go out of support […]

Read More

Crestron DM NVX

Crestron’s DM NVX AV-over-IP Line Receives IT Security Certifications

March 29, 2022 Zachary Comeau Leave a Comment

Workplace technology maker Crestron says its line of DM NVX AV-over-IP solutions are now certified by the National Information Assurance Partnership (NIAP) and the U.S. government’s Common Criteria, certifying that the products meet cybersecurity standards. The designations open up new avenues for the DM NVX products in U.S. government agencies, including federal civilian agencies and […]

Read More

Google, Bard

Update Google Chrome, Microsoft Edge To Patch Vulnerability Now

March 28, 2022 Zachary Comeau Leave a Comment

Google and Microsoft are urging organizations to deploy a patch to address a newly discovered zero-day vulnerability in Chrome. Other than being called a “Type Confusion in V8” and that an exploit for it exists in the wild, details about this particular vulnerability are scarce. Google says the Chrome update 99.0.4844.84 for Windows, Mac and […]

Read More

CISA Software Security

CISA Adds 66 CVEs to Known Exploited Vulnerabilities List

March 28, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added 66 software security bugs that are being actively exploited to its database of known exploited vulnerabilities, including some from leading technology vendors that date back several years. For the majority of the products implicated in the new additions, there are patches available to remediate the […]

Read More

McAfee ransomware attack

51% of Small Businesses Don’t Have Cybersecurity Measures in Place

March 25, 2022 TD Staff Leave a Comment

According to a new study, a majority of small businesses have no protection against cyberattacks, suggesting that businesses and their consumers are vulnerable to hacking and identity theft. A study from Digital.com, an independent website for small business online tools, products and services, revealed that 51% of small businesses do not have protection against cyberattacks. […]

Read More

MIcrosoft Entra External ID

New Microsoft Endpoint Manager Features Make macOS Management, Reporting Easier

March 25, 2022 Zachary Comeau Leave a Comment

Microsoft has released more features in Endpoint Manager to make it easier to manage macOS devices and their critical line of business apps, make the reporting experience more accurate and consistent and increase security for Windows and Windows Server. According to the company, it has had frequent requests from customers with a large number of […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 31
  • Page 32
  • Page 33
  • Page 34
  • Page 35
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.