• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Microsoft Collaboration Software InfoComm Videoconferencing Zoom Microsoft Teams Education BYOD UCC
Zoom Zero-Day

Double Check That Zoom Meeting Invite Before You Click ‘Start Meeting’

January 31, 2022 Alyssa Borelli Leave a Comment

Attackers are now seizing the opportunity to spoof Zoom meeting invites. About 10,000 mailboxes have been hit with the socially engineered emails, according to cybersecurity company Armorblox. The social engineered attacks are designed to look like a legitimate email from Zoom mimicking existing business workflows. Attackers will use the Zoom email address, “Zoom Communications” and […]

Read More

SBA Cybersecurity

SBA Announces Cybersecurity Grant Program for New Businesses

January 31, 2022 Zachary Comeau Leave a Comment

The U.S. Small Business Administration has announced a new $3 million program to help emerging small businesses develop their cybersecurity infrastructure. According to the SBA, state governments will be able to compete for grants via the Cybersecurity for Small Business Pilot Program to help small young businesses in their state to build their cyber defense […]

Read More

Tenable Research 2021 threat landscape retrospective report

The Top Vulnerabilities of 2021

January 31, 2022 TD Staff Leave a Comment

Tenable’s 2021 Threat landscape retrospective report looks back at year unlike any other. Dozens of groups, like REvil, Conti, DarkSide and more, dominated the headlines and continued to wreak havoc across a wide range of industries. Tenable’s research team noted a surge in ransomware attacks, data breaches, zero-days and much more in 2021. Top vulnerabilities […]

Read More

Largest DDoS Attack

Microsoft Says It Mitigated Largest Ever DDoS Attack

January 28, 2022 Zachary Comeau Leave a Comment

Microsoft says it recently mitigated a 3.47 Tbps DDoS attack with a packet rate of 340 million packets per second, which would make it the largest such attack in history. In an Azure blog, Microsoft says the November 2021 attack targeted an Azure customer in Asia that originated from about 10,000 sources from multiple countries, […]

Read More

Phishing

These Were The Top Phishing Topics in 2021

January 26, 2022 Zachary Comeau Leave a Comment

Phishing remains among the top security threats to any organization, as the attack vector is often where a hacker first attempts to steal credentials and access victim networks with the end goal of stealing secrets, deploying ransomware or other malicious activities. Since the start of the COVID-19 pandemic, phishing attempts have grown considerably, with nearly […]

Read More

content sprawl

4 Tips for Managing Content Sprawl in the Work-From-Home Era

January 26, 2022 Kyle McNabb Leave a Comment

As IT professionals know, the pace of digital transformation has accelerated rapidly as a result of the pandemic. This rapid shift to remote environments reshaped digital transformation priorities and challenges. Remote and hybrid work models have proven successful and delivered many benefits—such as enabling companies to expand its talent pools—which is why The Washington Post […]

Read More

RGB Spectrum

Video Processors Power Display Technology At Cybersecurity Training Facility

January 26, 2022 TD Staff Leave a Comment

The North East Independent School District (NEISD) in San Antonio, Texas opened a new cybersecurity training facility in response to increased cyberattacks. The new facility, Institute of CyberSecurity and Innovation (iCSI), trains students on detecting and identifying hacks and cyberattacks and responding to threats. Students from all seven NEISD high schools have access to networking […]

Read More

Microsoft OAuth Phishing

Microsoft Warns of OAuth Phishing Campaign

January 25, 2022 Zachary Comeau Leave a Comment

Microsoft says it is tracking a new consent phishing campaign that uses OAuth request links to trick users into granting consent to an app that gives malicious actors access to email accounts. In a series of tweets, Microsoft Security Intelligence says phishing messages misled users into granting permissions to an app called “Upgrade” that gave […]

Read More

Insider Risk, Microsoft

Both Negligent and Malicious Insider Cyber Threats Are Increasing

January 25, 2022 Zachary Comeau Leave a Comment

For the last two years as organizations adapt with remote work and other effects of the COVID-19 pandemic, cybercriminals have had a field day by exploiting weaknesses in distributed work security and the fact that our attention is elsewhere. That has forced many companies to invest in new technology to harden network defenses from outside […]

Read More

Phishing Success

The Most Imitated Brands in Phishing Attempts

January 25, 2022 TD Staff Leave a Comment

DHL has surpassed Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals in attempts to steal credentials or deploy malware via sophisticated phishing techniques. Twenty-three percent of all brand phishing attempts were related to DHL, up from just 9% in the previous quarter, according to Check Point Research’s latest Q4 brand phishing report. […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 62
  • Page 63
  • Page 64
  • Page 65
  • Page 66
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.