• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Malware Symantec Daxin

Sansec Finds Mass Breach Of Stores Running On Magento 1 E-Commerce Platform

February 11, 2022 TD Staff Leave a Comment

Adobe is urging organizations who use the Magento 1 e-commerce platform to upgrade to the latest Adobe Commerce platform. Sansec, an e-commerce malware and detection tool has identified a mass breach of over 500 stores running on the Magento 1 ecommerce platform. Although Adobe ended support for Magento 1 in June of 2020, many companies […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

Surfshark Releases Data Vulnerability Thermometer

February 11, 2022 Zachary Comeau Leave a Comment

VPN provider Surfshark has released what it calls the world’s first data vulnerability thermometer designed to inform users of their personal risk scores in data breaches. According to Surfshark, the company’s Data Vulnerability Thermometer combines open-sourced FBI information and research algorithms to give users their personal risk score, possible specific cybercrimes and prevention tactics on […]

Read More

employee data access

More Than A Third Of Former Employees Still Have Access To Company Data

February 10, 2022 Alyssa Borelli Leave a Comment

Leaving a job isn’t as simple as returning company issued equipment and key cards anymore. More than a third of former employees still have access to their company data, according to latest research from Beyond Identity, a passwordless authentication platform provider. Beyond Identity surveyed 1,121 employees and employers across Ireland, the U.K. and the U.S. […]

Read More

Microsoft Apple macOS bug

Apple: Apply These iPhone, iPad and Mac Patches Now

February 10, 2022 Zachary Comeau Leave a Comment

Organizations with iPhones, iPads in their IT environment should apply a new Apple security update that fixes a new zero day code execution vulnerability that has been exploited in the wild. In an advisory, Apple said the issue impacts a wide range of devices, including: iPhone 6s and later, iPad Pro (all models), iPad Air […]

Read More

NSA Programming Languages

Most Organizations Lack Visibility Into Their Insider Risk

February 10, 2022 Zachary Comeau Leave a Comment

The continued adoption of cloud technologies and a lack of visibility into them, the Great Resignation and employees taking IP and sensitive data with them, and a disconnect between executives and IT workers are leading to increased insider risk, according Code42. The insider risk management software firm’s Annual Data Exposure Report for 2022 finds that […]

Read More

Cloud Security, manageengine SIEM Log360 Cloud

Cybercriminals Are Using Malware To Target Linux-Based Systems

February 9, 2022 TD Staff Leave a Comment

With 90% of multi-cloud environments running on Linux-based systems and current malware countermeasures mostly focused on addressing Windows-based threats, attackers have found a golden opportunity to strike as cybercriminals are increasingly targeting Linux-based operating systems, according to latest research from VMware. The company’s new report, “Exposing Malware in Linux-based Multi-Cloud Environments,” shows ransomware is evolving […]

Read More

NordVPN Threat Protection

NordVPN Steps Further Into Cybersecurity With Threat Protection Offering

February 9, 2022 Zachary Comeau Leave a Comment

NordVPN is stepping into the antivirus market with the release of Threat Protection, a new cybersecurity product integrated into the NordVPN app that offers protection against phishing attempts, malicious websites, infected files and other online threats. Specifically, the new offering mitigates three primary kinds of threats: web trackers and malicious ads, harmful websites and infected […]

Read More

Fortinet Vulnerability, Fortigate

February Patch Tuesday: No Critical Bugs, But A Handful To Prioritize

February 8, 2022 Zachary Comeau Leave a Comment

Microsoft has released just 51 new patches to address vulnerabilities this month, but February’s Patch Tuesday comes with an anomaly: there are no critical-rated patches. The number of security patches is unusually low, as the company last month issued fixes for over 120 security bugs and patched 67 vulnerabilities in December. However, the most unusual […]

Read More

The Average Ransomware Payment In Q4 Was Over $322,000

February 8, 2022 Zachary Comeau Leave a Comment

Ransomware payments have skyrocketed in recent months, hitting an average of over $300,000 in the last quarter of 2021, as the risks of doing business has increased for ransomware threat actors, according to a new report. Coveware, a ransomware recovery firm, reports that the average ransomware payment in the fourth quarter was $322,168, a 130% […]

Read More

Microsoft Office VBA Macros

Microsoft To Disable VBA Macros For Office Apps By Default

February 8, 2022 Zachary Comeau Leave a Comment

Microsoft is rolling out a new security feature that will block VBA macros obtained from the internet by default for five Office apps that run macros, helping to prevent malware deployments to unwitting end users. In a Tech Community blog, the company says this default setting impacts Access, Excel, PowerPoint, Visio and Word, and only […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 60
  • Page 61
  • Page 62
  • Page 63
  • Page 64
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.