• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cybersecurity Microsoft Software ransomware ChatGPT AI Patch management Cisco Patch Tuesday Vulnerability Management
Man trying to log into computer with forgot password

Why You Shouldn’t Save Your Passwords in a Word Doc

March 9, 2022 TD Staff Leave a Comment

Small businesses are continuing to use Word documents or Excel spreadsheets to keep their passwords despite the inherit risk of compromise. A study by NordPass reveals 3 out of 7 companies admitted it keeps passwords in Word, Excel, or other plain text documents that were not password protected. Before adopting a company-wide password manager, none […]

Read More

MIcrosoft Entra External ID

March 2022 Patch Tuesday: Patch Exchange Sever, RDP Bugs ASAP

March 8, 2022 Zachary Comeau Leave a Comment

Microsoft has released 71 new security patches addressing vulnerabilities as part of the March 2022 Patch Tuesday, including three zero day bugs and three critical-rated software flaws. The patches fix issues in Windows, Azure Site Recovery, Microsoft Defender for Endpoint and IoT, Intune, Edge, Windows HTML Platforms, Office, Skype for Chrome, .NET and Visual Studio, […]

Read More

SBOMs

Report: Older Vulnerabilities Plaguing Legacy Systems

March 8, 2022 Zachary Comeau Leave a Comment

New critical software vulnerabilities are discovered every month, but its older vulnerabilities in legacy systems that continue to plague IT departments and cybersecurity professionals, according to new research from cybersecurity firm F-Secure. The report, Attack Landscape Update, dishes on trending cybersecurity threats, including ransomware, malware, phishing and more, but the most alarming information in the […]

Read More

Progress MOVEit vulnerability

The Conti Ransomware Leaks: Six Takeaways

March 7, 2022 Zachary Comeau Leave a Comment

Information security, nation-state hacking, ransomware and malware have been front and center of the Russia-Ukraine conflict, with hackers on each side allegedly launching large-scale attacks against the infrastructure of their opponent. Although Russia is infamous for its hacking activities and ransomware groups long believed to be protected by the country’s government, threat actors in other […]

Read More

IT jobs

CompTIA Jobs Report: Tech Hiring Eases Amid Labor Supply Constraints

March 4, 2022 TD Staff Leave a Comment

There’s still strong demand for tech talent even as employers eased back on hiring in February, according to analysis of the latest labor market data by CompTIA, the Downers Grove ILL., non-profit association for the information technology industry and workforce. Technology companies added 5,300 new workers in February for the 15th consecutive month of employment growth […]

Read More

1Password Browser Extension

We Aren’t Getting Much Better At Password Security

March 4, 2022 Zachary Comeau Leave a Comment

Users are not getting much better at password security, as 1.7 billion credential were exposed online in 2021, and 64% of users with multiple compromised passwords reuse similar passwords for multiple accounts, according to a new report from account security firm SpyCloud. The company, in its Identity Exposure Report, says the number of exposed credentials […]

Read More

Social Engineering

5 Strangest Social Engineering Tactics of 2021

March 3, 2022 TD Staff Leave a Comment

Cyber attackers can be quite inventive when it comes to social engineering and persuading someone to do something that isn’t always in their best interest— logging into a phishing site and entering their credentials, luring victims to pay a fake invoice, or simply opening a file containing malware. Cybersecurity firm Proofpoint rounded up the top […]

Read More

MIcrosoft Entra External ID

Microsoft Introduces Role-based Access Management Capabilities in Azure AD

March 3, 2022 Zachary Comeau Leave a Comment

Microsoft is introducing a series of new capabilities in Azure Active Directory, including custom roles for delegated app management to help enable fine-grained authorization and simplify management at scale in Azure and Microsoft 365. According to a Tech Community blog, custom roles for delegated app management is now in general availability, enabling custom roles for […]

Read More

Google Cybersecurity Certificate

Senate-Passed Cybersecurity Bill Requires Incident Reporting Within 72 Hours

March 2, 2022 Zachary Comeau Leave a Comment

The Senate has passed a bipartisan bill designed to harden U.S. cybersecurity in both public and private sectors requiring organizations to report significant cyberattacks and ransomware payments to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The proposed bill, Strengthening American Cybersecurity Act, combines language from three bills that Sens. Rob Portman (R-OH), Gary Peters […]

Read More

Blockchain for enterprises

Blockchain is Coming to the Enterprise. How Can It Be Used?

March 2, 2022 Kieren James-Lubin Leave a Comment

Blockchain has become one of the hottest buzzwords across the business and technology worlds. But what does this mean for enterprises, if anything? How can CIOs and tech leaders make the best decisions in these early days? In essence, blockchain is a tool – much like the internet is a tool – with immense promise […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 34
  • Page 35
  • Page 36
  • Page 37
  • Page 38
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.