• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Amazon facial recognition, police

Privacy Claims, Lawsuits Related to Biometrics Will Reach $8 Billion in 2025

February 15, 2022 Zachary Comeau Leave a Comment

Lawsuits and claims related to biometric information processing and cyber-physical systems will reach $8 billion in fines and settlements by 2025 as privacy budgets are also expected to grow significantly, according to IT research firm Gartner. AI-enabled technologies, smart buildings, smart cities and other cyber-physical systems that capture biometric information are growing, but that information […]

Read More

IT Considerations M&A, Proofpoint, Illusive

Navigating the IT Considerations of M&A

February 14, 2022 Zachary Comeau Leave a Comment

In today’s digital age, when technology drives innovation and serves as a foundational piece of any organization, the IT department is a critical consideration when conducting a merger or an acquisition. Integrating the technology used by each organization is an incredibly important and time-consuming task that requires diligence and deliberate decision-making to ensure that the […]

Read More

Young man with vr headset

Security Vulnerabilities Found in VR Headsets

February 14, 2022 TD Staff Leave a Comment

Voice command features on virtual reality (VR) headsets pose vulnerabilities and could lead to major privacy eavesdropping attacks, according to researchers at Rutgers University-New Brunswick. The research shows hackers could use popular AR/VR headsets with built in motion sensors to record subtle, speech-associated facial dynamics to steal sensitive information communicated via voice-command, including credit card […]

Read More

Southern IL Univ Edwardsville (SIUE) students

SIUE Automates Transfer Evaluation Process with TES

February 14, 2022 TD Staff Leave a Comment

With more than 13,000 students and receiving approximately 3,400 transfer students annually, Southern Illinois University Edwardsville (SIUE) needed a way to transform its transfer evaluation process for quicker, more efficient transfer decisions. Handling the process manually, the institution’s staff previously needed a full 15 days to evaluate and apply each student’s incoming coursework. They sought […]

Read More

CISA Software Security

This CISA Resource Can Help Protect You From Actively Exploited Bugs

February 14, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has been extremely active in helping both the public sector and private sector respond to cybersecurity threats, and is often one of the leading voices when new threats emerge. The agency, part of DHS, has released guides, advisories and other resources on current and historical threats, and […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

Surfshark Releases Data Vulnerability Thermometer

February 11, 2022 Zachary Comeau Leave a Comment

VPN provider Surfshark has released what it calls the world’s first data vulnerability thermometer designed to inform users of their personal risk scores in data breaches. According to Surfshark, the company’s Data Vulnerability Thermometer combines open-sourced FBI information and research algorithms to give users their personal risk score, possible specific cybercrimes and prevention tactics on […]

Read More

employee data access

More Than A Third Of Former Employees Still Have Access To Company Data

February 10, 2022 Alyssa Borelli Leave a Comment

Leaving a job isn’t as simple as returning company issued equipment and key cards anymore. More than a third of former employees still have access to their company data, according to latest research from Beyond Identity, a passwordless authentication platform provider. Beyond Identity surveyed 1,121 employees and employers across Ireland, the U.K. and the U.S. […]

Read More

Microsoft Apple macOS bug

Apple: Apply These iPhone, iPad and Mac Patches Now

February 10, 2022 Zachary Comeau Leave a Comment

Organizations with iPhones, iPads in their IT environment should apply a new Apple security update that fixes a new zero day code execution vulnerability that has been exploited in the wild. In an advisory, Apple said the issue impacts a wide range of devices, including: iPhone 6s and later, iPad Pro (all models), iPad Air […]

Read More

NSA Programming Languages

Most Organizations Lack Visibility Into Their Insider Risk

February 10, 2022 Zachary Comeau Leave a Comment

The continued adoption of cloud technologies and a lack of visibility into them, the Great Resignation and employees taking IP and sensitive data with them, and a disconnect between executives and IT workers are leading to increased insider risk, according Code42. The insider risk management software firm’s Annual Data Exposure Report for 2022 finds that […]

Read More

NordVPN Threat Protection

NordVPN Steps Further Into Cybersecurity With Threat Protection Offering

February 9, 2022 Zachary Comeau Leave a Comment

NordVPN is stepping into the antivirus market with the release of Threat Protection, a new cybersecurity product integrated into the NordVPN app that offers protection against phishing attempts, malicious websites, infected files and other online threats. Specifically, the new offering mitigates three primary kinds of threats: web trackers and malicious ads, harmful websites and infected […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 37
  • Page 38
  • Page 39
  • Page 40
  • Page 41
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.