• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud InfoComm Videoconferencing Hybrid Work Education AI UCC Microphones Mass Notification
Stock photo of services available on a wireless network.

Black Box and Inseego Partner on Future-Proof 5G Solutions

March 14, 2022 TD Staff Leave a Comment

Black Box, the Lawrence, Penn.-based global solutions integrator, announced its strategic partnership with device-to-cloud industry innovator, Inseego. Together, the companies will provide a complete, advanced 5G and OnGo private LTE wireless network. The partnership thus allows Black Box to drive innovation in connectivity. This will then increase advanced wireless networking options to every market. Black […]

Read More

Atera ESET Integration

The Qakbot Malware Now Interjects Itself Into The Middle of Email Conversations

March 11, 2022 Zachary Comeau Leave a Comment

The notorious and heavily distributed email-borne malware Qakbot is now being spread via a new technique: inserting malicious replies into the middle of existing email conversations. According to cybersecurity firm Sophos, Qakbot uses the compromised accounts of other infected victims to interject itself in the form of a reply-all message that includes a short sentence […]

Read More

LastPass Breach, Hack

The Amount Of Passwords End Users Have Is Leading To Poor Security Habits

March 10, 2022 Zachary Comeau Leave a Comment

The IT industry continues to hammer home the idea that identity security and password hygiene are often the first lines of defense when it comes to cyberattacks, yet organizations continue to engage in poor practices and have trouble balancing security requirements and user experiences. Just recently, we have covered several studies from IT companies about […]

Read More

Cybersecurity testing, penetration testing, cyber threats

Study: It Takes Over Three Months For Cybersecurity Teams to Adopt New Skills

March 10, 2022 Zachary Comeau Leave a Comment

With today’s cybersecurity attacks rapidly escalating to never-before-seen proportions and new threats constantly emerging, IT and cybersecurity professionals should be able to quickly pivot and develop the knowledge and skills to defend against these threats. However, a new study suggests that it takes more than three months for that to happen. According to cybersecurity firm […]

Read More

Drata Risk Management

7 Security & Risk Management Trends IT Leaders Should Know

March 9, 2022 TD Staff Leave a Comment

Security and risk management leaders must evolve their strategies to protect their organization’s expanding digital footprint against new and emerging threats in 2022 and beyond, according to Gartner. The research firm has identified seven security and risk management trends leaders should know: Trend #1: Attack Surface Expansion Enterprise attacks are expanding and so are risks […]

Read More

1Password Browser Extension

The Most Common Passwords Used In Brute Force & Spraying Attacks

March 9, 2022 Zachary Comeau Leave a Comment

Despite an increased focus on identity, multifactor authentication and password security, passwords continue to be vulnerable to attack, according to a new report from password security provider Specops Software. According to the study, The 2022 Weak Password Report, 93% of password attacks use passwords with at least eight characters, suggesting that attackers are aware of […]

Read More

speech recognition voice enabled technology for business

How Voice Assistants are Evolving for the Enterprise

March 9, 2022 Mark Horne Leave a Comment

We asked Mark Horne, chief marketing officer at Pindrop, five questions about voice assistant trends in the enterprise, how organizations can utilize it, the hesitations of adoption and  how it will continue to evolve in the foreseeable future. Q: What have been the most significant trends driving voice technology in the last 5 years? Horne: […]

Read More

Man trying to log into computer with forgot password

Why You Shouldn’t Save Your Passwords in a Word Doc

March 9, 2022 TD Staff Leave a Comment

Small businesses are continuing to use Word documents or Excel spreadsheets to keep their passwords despite the inherit risk of compromise. A study by NordPass reveals 3 out of 7 companies admitted it keeps passwords in Word, Excel, or other plain text documents that were not password protected. Before adopting a company-wide password manager, none […]

Read More

MIcrosoft Entra External ID

March 2022 Patch Tuesday: Patch Exchange Sever, RDP Bugs ASAP

March 8, 2022 Zachary Comeau Leave a Comment

Microsoft has released 71 new security patches addressing vulnerabilities as part of the March 2022 Patch Tuesday, including three zero day bugs and three critical-rated software flaws. The patches fix issues in Windows, Azure Site Recovery, Microsoft Defender for Endpoint and IoT, Intune, Edge, Windows HTML Platforms, Office, Skype for Chrome, .NET and Visual Studio, […]

Read More

SBOMs

Report: Older Vulnerabilities Plaguing Legacy Systems

March 8, 2022 Zachary Comeau Leave a Comment

New critical software vulnerabilities are discovered every month, but its older vulnerabilities in legacy systems that continue to plague IT departments and cybersecurity professionals, according to new research from cybersecurity firm F-Secure. The report, Attack Landscape Update, dishes on trending cybersecurity threats, including ransomware, malware, phishing and more, but the most alarming information in the […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 56
  • Page 57
  • Page 58
  • Page 59
  • Page 60
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.