• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud InfoComm Videoconferencing Hybrid Work Education AI UCC Microphones Mass Notification
Expel MDR for Kubernetes, cloud

Cloud Migration Is a Priority, But Security Concerns Remain

February 1, 2022 Zachary Comeau Leave a Comment

Although fewer than 40% of tech executives store more than half of their legacy app data on the cloud, more than 80% of tech leaders are prioritizing a move to the cloud for their legacy app data over the next 12 months, according to new research from cloud migration software provider Archive360. The company’s survey […]

Read More

Windows Update Connectivity

Microsoft: This is Why Some Windows Devices Don’t Update

January 31, 2022 Zachary Comeau Leave a Comment

Microsoft says devices need to be powered on and connected to Windows Update for at least eight hours to ensure a successful update. In a Tech Community blog on achieving better patch compliance, the company says it looked into why some Windows devices are not always full up to date, and one of the most […]

Read More

Zoom Zero-Day

Double Check That Zoom Meeting Invite Before You Click ‘Start Meeting’

January 31, 2022 Alyssa Borelli Leave a Comment

Attackers are now seizing the opportunity to spoof Zoom meeting invites. About 10,000 mailboxes have been hit with the socially engineered emails, according to cybersecurity company Armorblox. The social engineered attacks are designed to look like a legitimate email from Zoom mimicking existing business workflows. Attackers will use the Zoom email address, “Zoom Communications” and […]

Read More

SBA Cybersecurity

SBA Announces Cybersecurity Grant Program for New Businesses

January 31, 2022 Zachary Comeau Leave a Comment

The U.S. Small Business Administration has announced a new $3 million program to help emerging small businesses develop their cybersecurity infrastructure. According to the SBA, state governments will be able to compete for grants via the Cybersecurity for Small Business Pilot Program to help small young businesses in their state to build their cyber defense […]

Read More

Tenable Research 2021 threat landscape retrospective report

The Top Vulnerabilities of 2021

January 31, 2022 TD Staff Leave a Comment

Tenable’s 2021 Threat landscape retrospective report looks back at year unlike any other. Dozens of groups, like REvil, Conti, DarkSide and more, dominated the headlines and continued to wreak havoc across a wide range of industries. Tenable’s research team noted a surge in ransomware attacks, data breaches, zero-days and much more in 2021. Top vulnerabilities […]

Read More

Largest DDoS Attack

Microsoft Says It Mitigated Largest Ever DDoS Attack

January 28, 2022 Zachary Comeau Leave a Comment

Microsoft says it recently mitigated a 3.47 Tbps DDoS attack with a packet rate of 340 million packets per second, which would make it the largest such attack in history. In an Azure blog, Microsoft says the November 2021 attack targeted an Azure customer in Asia that originated from about 10,000 sources from multiple countries, […]

Read More

Phishing

These Were The Top Phishing Topics in 2021

January 26, 2022 Zachary Comeau Leave a Comment

Phishing remains among the top security threats to any organization, as the attack vector is often where a hacker first attempts to steal credentials and access victim networks with the end goal of stealing secrets, deploying ransomware or other malicious activities. Since the start of the COVID-19 pandemic, phishing attempts have grown considerably, with nearly […]

Read More

content sprawl

4 Tips for Managing Content Sprawl in the Work-From-Home Era

January 26, 2022 Kyle McNabb Leave a Comment

As IT professionals know, the pace of digital transformation has accelerated rapidly as a result of the pandemic. This rapid shift to remote environments reshaped digital transformation priorities and challenges. Remote and hybrid work models have proven successful and delivered many benefits—such as enabling companies to expand its talent pools—which is why The Washington Post […]

Read More

RGB Spectrum

Video Processors Power Display Technology At Cybersecurity Training Facility

January 26, 2022 TD Staff Leave a Comment

The North East Independent School District (NEISD) in San Antonio, Texas opened a new cybersecurity training facility in response to increased cyberattacks. The new facility, Institute of CyberSecurity and Innovation (iCSI), trains students on detecting and identifying hacks and cyberattacks and responding to threats. Students from all seven NEISD high schools have access to networking […]

Read More

Microsoft OAuth Phishing

Microsoft Warns of OAuth Phishing Campaign

January 25, 2022 Zachary Comeau Leave a Comment

Microsoft says it is tracking a new consent phishing campaign that uses OAuth request links to trick users into granting consent to an app that gives malicious actors access to email accounts. In a series of tweets, Microsoft Security Intelligence says phishing messages misled users into granting permissions to an app called “Upgrade” that gave […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 62
  • Page 63
  • Page 64
  • Page 65
  • Page 66
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.