• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud InfoComm Videoconferencing Education AI UCC Microphones Mass Notification Generative AI
MIcrosoft Entra External ID

Microsoft: Basic Auth Will be Disabled Next Month

December 22, 2022 Zachary Comeau Leave a Comment

With a holiday break upon us, Microsoft is again warning Exchange customers of deprecation of basic authentication in Exchange, which will take place early in the new year once employees come back from a long break. The Redmond, Wash.-based IT giant has been warning customers of this move for awhile, and the time has finally […]

Read More

Microsoft Apple macOS bug

Microsoft Discovers macOS Security Bypass Bug

December 22, 2022 Zachary Comeau Leave a Comment

Microsoft says it has uncovered a vulnerability in macOS that could allow attackers to bypass restrictions imposed by Apple’s Gatekeeper security mechanism, which is designed to ensure that only trusted apps run on the company’s devices. According to Microsoft’s Security Threat Intelligence team, the vulnerability, it calls Achilles, could allow attackers to bypass Gatekeeper and […]

Read More

FBI search engine ads, tablet, Gartner, worldwide device shipments

FBI: Beware of Search Engine Ads

December 21, 2022 Zachary Comeau Leave a Comment

The FBI is urging organizations and their end users to be careful when using search engines as cybercriminals are using search engine advertisement services to impersonate brands and direct users to fake websites designed to steal credentials and deploy ransomware. According to a public service announcement from the FBI, cybercriminals have been buying advertisements that […]

Read More

SASE, SASE approaches, SASE implementation

Axonius Updates SaaS Management Offering

December 20, 2022 TD Staff Leave a Comment

Axonius, the New York-based provider of cybersecurity asset management and SaaS management, released two new capabilities within Axonius SaaS Management to help organizations better understand their overall SaaS application risk. According to the company, behavioral analytics and SaaS app-to-device correlation allow IT and security teams to gain added visibility and context into the users and […]

Read More

Metaverse Security

The Metaverse Presents Opportunity, but Also Security Risks

December 20, 2022 Zachary Comeau Leave a Comment

The metaverse is emerging as a new technology that both consumers and businesses see as valuable for communication, collaboration, enhanced services, entertainment and real estate, but those hopes also come with the same security concerns any IT professionals have about a new technology. Nearly 70% of organizations are planning to do business in the metaverse […]

Read More

Google, Bard

Google Rolls Out Client-Side Encryption Beta for Gmail on the Web

December 20, 2022 Zachary Comeau Leave a Comment

Google is bringing client-side encryption to Gmail on the web, giving Google Workspace users the ability to add more security to their emails and strengthen the confidentiality of their data. According to Google, Workspace Enterprise Plus, Education Plus and Education Standard customers are eligible to apply for the client-side encryption beta until Jan. 20, 2023. […]

Read More

Phishing Success

U.S. Agencies Warn Food Industry About Business Email Compromise Campaigns

December 19, 2022 Zachary Comeau Leave a Comment

U.S. agencies are warning organizations in the food and agriculture sector about recently observed incidents of business email compromise designed to steal shipments of food products and ingredients with hefty price tags. Instead of being used to directly steal money, these new campaigns are designed to spoof emails and domains to impersonate employees of legitimate […]

Read More

The executive hands prevent the employee from receiving and opening a spam mail, the concept of information security in companies, data protection on the internet

Phishing Scams: 5 Tips on Training Employees

December 19, 2022 Roy Zur Leave a Comment

Phishing attacks have been around for just about as long as email, yet employees still regularly fall for them. According to the U.S. Federal Bureau of Investigation, roughly 90% of data breaches occur on account of phishing and those attacks have increased approximately 400% since the start of the COVID-19 pandemic. Assessing and reacting to […]

Read More

NSA Programming Languages

How To Protect Your Organization from Cyberattacks Before The Holidays

December 19, 2022 Zachary Comeau Leave a Comment

Editor’s note: This article was originally published last year, but the main points are still relevant today as we head into another holiday break. Review these tips and recommendations to keep your organization safe and secure this year.  With the holidays approaching, federal officials are again warning organizations of all sizes to be on the […]

Read More

Microsoft Apple macOS bug

Apple Fixes Actively Exploited Bug in WebKit Impacting Wide Range of Devices

December 15, 2022 Zachary Comeau Leave a Comment

Apple this week has patched a wide range of security fixes, including one in WebKit that is being actively exploited and impacting all supported iPhones. The security update, included in iOS 16.1.2, macOS Ventura, macOS Big Sur, macOS Monterey, Apple TV, fixes a bug that would allow arbitrary code execution if maliciously crafted web content […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Page 23
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.