• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
China, Hacking, Microsoft, Routers, Volt Typhoon

Ransomware Attacks Rise Almost 93% in 2021

February 23, 2022 TD Staff Leave a Comment

Ransomware attacks almost doubled in 2021, rising to 92.7% year-over-year, according to NCC Group, a global cyber security and risk mitigation firm. The firm’s 2021 Annual Threat Monitor shows a gradual but noticeable rise in ransomware attacks since the pandemic began. Ransomware accounted for 65.38% of all incidents dealt with by NCC’s global cyber response […]

Read More

CISA Software Security

Supplement Your Cybersecurity Staff With These Free CISA Resources

February 22, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency has released a litany of free security tools and resources designed to help organizations advance its security capabilities, including widely used open-source tools and services offered by private and public sector organizations. The catalog of free resources comes amid rising geopolitical tensions that both government agencies and software […]

Read More

Phishing Success

Phishing, Ransomware Continue To Plague Businesses As Awareness Stagnates

February 22, 2022 Zachary Comeau Leave a Comment

More than two-thirds were infected with ransomware from a direct email payload, and 60% of those victims paid the ransom, according to new research from cybersecurity and compliance firm Proofpoint. The company’s 2022 State of the Phish Report, the results of a survey of 600 IT professionals and 3,500 workers, reveals that phishing and other […]

Read More

AtlasIED IPX Sponsored Content

Why IT Is Now Tasked With Managing Mass Communications

February 22, 2022 Zachary Comeau Leave a Comment

With more and more devices being deployed on the network, IT professionals can now expect to manage everything from endpoints, collaboration tools and firewalls and now to mass communication systems. Gone are the days of hard-wired mass communications systems that require infrastructure separate from existing IT infrastructures, and that is bringing even more technology under […]

Read More

MIcrosoft Entra External ID

Microsoft Pushes Zero Trust Capabilities In Azure

February 18, 2022 Zachary Comeau Leave a Comment

Microsoft is positioning itself as a partner in the U.S. government’s push toward a Zero Trust architecture, including the publication of resources designed to help organizations migrate to the cloud and adopt a Zero Trust framework and the release of Azure capabilities to help secure cloud environments. In a new blog, Microsoft outlined several resources, […]

Read More

Microsoft Security RSA Conference

Windows 11 Pro Will Require Microsoft Account, Internet Connection During Setup

February 18, 2022 Zachary Comeau Leave a Comment

Like Windows 11 Home edition, Windows 11 Pro edition will require an internet connection and Microsoft account during the initial device setup, Microsoft says. The news came in a blog announcing features and fixes in Windows 11 Insider Preview Build 22557 released to the Dev Channel. The requirement will likely be required as part of […]

Read More

Cassandra Apache vulnerability

Patch This Apache Cassandra Vulnerability

February 17, 2022 TD Staff Leave a Comment

Researchers at JFrog Security have released details of a remote code execution vulnerability with the popular NoSQL database, Apache Cassandra. The popular database is used by enterprises such as Netflix, Twitter, Constast Contact, Cisco, Reddit and many more. The open source database is also used by devOps and cloud-native development circles and companies that provide […]

Read More

Russia Ukraine Cyberattacks

Cybersecurity Experts: Ukraine, Russia Crisis Could Result in U.S. Cyberattacks

February 16, 2022 Zachary Comeau Leave a Comment

As the world waits to see what unfolds in Ukraine, cybersecurity professionals are urging western governments and organizations to be prepared for serious cyberattacks coming from Russia and its allies. These warnings come from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) as well as private sector cybersecurity software providers like Mandiant that have raised […]

Read More

Azure AD Unmanaged Accounts

This Azure AD Authentication Method Can Help With Zero Trust

February 16, 2022 Zachary Comeau Leave a Comment

Microsoft has announced the public preview of Azure Active Directory certificate-based authentication across its commercial and U.S. government clouds, a response to President Joe Biden’s executive order on cybersecurity designed to push the government to zero trust. The offering is designed to help government customers meet phishing-resistant MFA using the PIV/CAC cards, and it can […]

Read More

VMware Vulnerabilities

VMware: Patch These Vulnerabilities Immediately

February 15, 2022 Zachary Comeau Leave a Comment

VMware is urging customers to immediately patch vulnerabilities in ESXi, Workstation, Fusion and Cloud Foundation running in on-premises or co-located settings. The patches fix a total of five CVEs in those products that were disclosed during the Tianfu Cup, a Chinese security event that VMware participates in. According to the company, the flaws were reported […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 36
  • Page 37
  • Page 38
  • Page 39
  • Page 40
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.