• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT

How Fast Does Ransomware Encrypt Files?

March 25, 2022 Zachary Comeau Leave a Comment

For IT and cybersecurity professionals, ransomware has been the scourge of the earth over the last two years, as the cybercrime economy continues to grow and beat system administrators and network defense pros to the point of attack. One reason for the difficulty in preventing and responding to ransomware attacks is the speed with which […]

Read More

McAfee ransomware attack

51% of Small Businesses Don’t Have Cybersecurity Measures in Place

March 25, 2022 TD Staff Leave a Comment

According to a new study, a majority of small businesses have no protection against cyberattacks, suggesting that businesses and their consumers are vulnerable to hacking and identity theft. A study from Digital.com, an independent website for small business online tools, products and services, revealed that 51% of small businesses do not have protection against cyberattacks. […]

Read More

Phishing Success rates

Watch Out For This Chameleon Phishing Scheme

March 25, 2022 TD Staff Leave a Comment

Security researchers at TrustWave SpiderLabs encountered a phishing scheme that acts like a chameleon by changing and blending its color based on its environment. The site adapts its background page and logo depending on the user input to trick victims into giving away their email credentials. The phishing scheme starts with an email asking the […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

30% Of Log4j Instances Remain Vulnerable To Exploitation

March 24, 2022 Zachary Comeau Leave a Comment

More than two months after the Log4j vulnerabilities known as Log4Shell were discovered, 30% of Log4j instances remain vulnerable for hackers to exploit and take control of affected systems, according to cybersecurity firm Qualys. The company indexed more than 10 trillion data points across its installed enterprise customer base and completed six billion IP scans […]

Read More

Zero Trust, Leostream, AWS

Zscaler Introduces Advanced Zero Trust Solutions to Minimize Attack Surface, Prevent Lateral Movement

March 23, 2022 Zachary Comeau Leave a Comment

Cloud security provider Zscaler is launching what it says are three industry-first zero trust network access innovations designed to replace legacy firewalls and VPNs delivered as part of the company’s Zero Trust Exchange. According to the company, the offerings — private app protection, integrated deception and privileged remote access for industrial IoT and OT systems […]

Read More

Lapsus$ Microsoft Okta

Lapsus$ Attacks: Microsoft Says Group Pays Employees For Initial Access; Okta Provides Attack Timeline

March 23, 2022 Zachary Comeau Leave a Comment

Microsoft acknowledges Lapsus$ accessed source code, downplays risk to customers and risk of elevation Lapsus$ uses extensive social engineering, including paying victims’ employees for initial access and convincing help desks to reset credentials Group uses VPNs, RDP, VDI and identity providers such as Azure AD, Okta in attacks Okta says 2.5% of customers potentially impacted […]

Read More

Zerto 10, ransomware

Report: Ransomware Attacks Increase In February After Quiet December, January

March 22, 2022 Zachary Comeau Leave a Comment

Ransomware attacks continue to increase, with NCC Group reporting a nearly 53% rise in ransomware incidents last month. According to the cybersecurity and risk mitigation firm, ransomware attacks increased from 121 in January to 185 in February, with industrials, consumer cyclicals and technology the most targeted sectors. This NCC report comes after the organization reported […]

Read More

LastPass Breach, Hack

LastPass Business Announces Integrations with PingOne and PingFederate

March 22, 2022 TD Staff Leave a Comment

Password management provider LastPass announced new integrations with Ping Identity, including PingOne and PingFederate to better serve enterprise businesses. Customers using PingOne and PingFederate as its identity provider (IdP) can now integrate with LastPass to simplify access management and easily scale proper password hygiene across entire organizations, saving time for IT departments while keeping data […]

Read More

MIcrosoft Okta Lapsus$

What We Know So Far About Okta, Microsoft and Lapsus$

March 22, 2022 Zachary Comeau Leave a Comment

This article has been amended to reflect an updated statement on the incident from Okta.  After screenshots claiming to stem from security breaches at IT giant Microsoft and identity and authentication provider Okta, both companies are investigating possible attacks from the Lapsus$ hacking group. In statements to various media outlets, the companies say they are […]

Read More

Russia Cyberattack

Russian Cyberattack Threat Evolves, Spurs New White House Warning To Harden IT Environments

March 21, 2022 Zachary Comeau Leave a Comment

The White House is urging organizations to take immediate action to harden cyber defenses as credible intelligence of a Russian cyberattack in response to U.S. involvement in the Ukraine crisis continues to evolve. In a statement by President Joe Biden and a related fact sheet, the administration says there is “evolving intelligence that the Russian […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 54
  • Page 55
  • Page 56
  • Page 57
  • Page 58
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.