• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Compliance

As a technology manager you want to make sure you’re doing everything correctly. Learn about working with technology installer partners, regulations to meet under different technologies, certifications to earn, and more.

Popular Tags within: Compliance

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Cybersecurity Certifications

Entry-Level Cybersecurity Certifications You Need In 2021

August 9, 2021 Zachary Comeau Leave a Comment

IT teams everywhere have been busy over the last year and a half helping their organization transition to remote work, and then back to a hybrid work environment as the COVID-19 pandemic began to subside earlier this year. As organizations were scrambling to adopt new technologies and solutions to accommodate those work models, cybercriminals seized, […]

Read More

Google Cybersecurity Certificate

What To Do When End Users Won’t Complete Cybersecurity Training

August 6, 2021 Zachary Comeau Leave a Comment

Your organization’s employees are required once a year to complete some form of cybersecurity training, which might include a short online course, training videos and a test to wrap it all up. Whether that model of training is adequate in today’s cyber climate is another question, but what if employees aren’t even taking that rudimentary […]

Read More

managers should use positive reinforcement

IT Managers: Stop Blaming & Use Positive Reinforcement Instead

August 3, 2021 Alyssa Borelli Leave a Comment

When cyber incidents happen, managers shouldn’t blame employees, but must rethink their approach using positive reinforcement.

Read More

Remote Desktop Management

Top 5 Features to Look for in a Remote Desktop Management Solution

August 3, 2021 By Maxime Trottier Leave a Comment

In a typical workday — which, alas, often extends into a work evening or work weekend— sysadmins connect to remote systems using Remote Desktop Protocol (RDP), PuTTY, SSH, FTP, Telnet, browser-based apps, virtual private networks (VPNs), proprietary software, and many other solutions. To suggest that these tools are important is an understatement. They are essential, […]

Read More

Data Breaches Average Cost

Report: Pandemic Led to More Expensive Data Breaches

July 30, 2021 Jess DeWitt Leave a Comment

According to a report by IBM security, data breaches hit record highs in terms of cost due to the COVID-19 pandemic. Even before the pandemic, data breaches were becoming a more frequent problem for organizations, but due to multiple factors, they became more problematic in the past year. IBM Security hired Ponemon Institute to compile […]

Read More

Zero Trust, Leostream, AWS

Microsoft: Zero Trust Is Now A Top IT Priority

July 29, 2021 Zachary Comeau Leave a Comment

As organizations look for new ways to deal with the growing threat of cyberattacks, Zero Trust is increasingly becoming mainstream among IT and cybersecurity professionals, according to a new report from Microsoft. The IT giant has released its Zero Trust Adoption Report 2021 in which more than 1,200 security decision-makers were surveyed about their Zero […]

Read More

SolarWinds Virtual Agent AI

SolarWinds Report: IT Pros, Leaders Aligning More on Cyber Risk

July 28, 2021 Zachary Comeau Leave a Comment

Eight months after the Russia-led highly sophisticated hacking campaign leveraging the SolarWinds Orion platform, the company has released its annual IT Trends Report, this one highlighting how IT professionals perceive their organization’s cyber risk management and mitigation after a tumultuous year. The report touches on everything from external threats, internal threats, remote work policies and […]

Read More

Exploited Vulnerabilities

Patch These Heavily Exploited Vulnerabilities Now

July 28, 2021 Zachary Comeau Leave a Comment

When a vendor or security researcher discloses a vulnerability in an IT product, organizations should be quick to apply the patch or implement a secure workaround to protect networks from bad actors that are quick to exploit that vulnerability. When those vulnerabilities are in widely used products from popular vendors like Citrix, Pulse, Microsoft and […]

Read More

Beyond Identity

What You Can Learn From Twitter Users’ Awful 2FA Adoption

July 23, 2021 Zachary Comeau Leave a Comment

Two-factor authentication or multi-factor authentication – although not the end all be all to account security – have emerged as an effective way of safeguarding sensitive accounts since an attacker would need access to an email address, mobile phone or authenticator app in addition to your credentials. With several notable high-profile Twitter accounts being compromised […]

Read More

Ransomware

Ransomware Is Now More Than Just Data Encryption

July 20, 2021 Zachary Comeau Leave a Comment

Ransomware continues to be a cybersecurity pandemic as organizations are being forced to either rebuild their systems from scratch or pay six-figure ransoms for a decryption tool from the hackers that might not even work that well. However, cybercriminals are getting smarter and are adopting new methods and techniques, and having your data held hostage […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 48
  • Page 49
  • Page 50
  • Page 51
  • Page 52
  • Interim pages omitted …
  • Page 131
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.