• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Google Cybersecurity Certificate

Do Your End Users Think Security Gets In The Way?

September 9, 2021 Zachary Comeau Leave a Comment

According to a new study, over 90% of IT teams feel pressured to compromise security if it benefits their organization’s business continuity, reinforcing the narrative that remote and hybrid work practices are not conducive to a strong cybersecurity posture. The findings come from the HP Wolf Security study, Rebellions & Rejections, that uncovers workforce security […]

Read More

Microsoft January Patch Tuesday

What You Need To Know About The MSHTML Vulnerability

September 9, 2021 Zachary Comeau Leave a Comment

Microsoft is warning of a new zero-day vulnerability in Windows MSHTML that allows attackers to perform remote code execution via a malicious ActiveX control and a Microsoft Office document. Microsoft and CISA issued warnings about the vulnerability this week, with both saying the vulnerability has been exploited in the wild. It has been assigned to […]

Read More

Royal Ransomware

Ransomware Attacks Increase Threefold; IT Must Adapt

September 8, 2021 Zachary Comeau Leave a Comment

When the U.S. government began pressuring Russia to do more to stop ransomware groups originating from that country from attacking U.S.-based organizations, IT and cybersecurity professionals were hopeful that those actions would pay off. Shortly after a meeting between the two country’s leaders, infamous ransomware group rEvil went dark, which some thought was a sign […]

Read More

What Is The Ideal Ransomware Victim?

September 7, 2021 Zachary Comeau Leave a Comment

According to a new report, the ideal ransomware victim is in a lucrative commercial market in a wealthy country that uses remote desktop protocol or a VPN. Cybersecurity firm KELA’s report cited activity from July 2021 that indicated ransomware attackers prefer organizations in specific geographies and markets, and prefer very specific products for initial network access. […]

Read More

End User Habits

System Admins Hate These Frustrating End User Habits

September 3, 2021 Zachary Comeau Leave a Comment

It took me just a few months into writing about the world of IT to realize that I was the annoying end user that admins love to complain about. I looked for ways to communicate with my organization’s IT professionals outside of the preferred channels, I asked for urgency with every request, used my work […]

Read More

Infosec, Cybersecurity Awareness

How To Communicate Cybersecurity To The Board

September 1, 2021 Alyssa Borelli Leave a Comment

CISOs must be able to clearly communicate cybersecurity to the board in today’s evolving business and tech landscape.

Read More

IT Should Be Extra Vigilant Around Holiday Weekends

September 1, 2021 Zachary Comeau Leave a Comment

The last few major ransomware attacks have occurred on or around holiday weekends, and IT admins and cybersecurity personnel are being urged to keep a watchful eye as we approach Labor Day Weekend. Offices are normally closed around those holidays, so IT professionals typically don’t catch intrusions in time until systems are encrypted and hackers […]

Read More

Cloud Security, manageengine SIEM Log360 Cloud

Is the Cloud More Secure Than On Prem?

August 31, 2021 Zachary Comeau Leave a Comment

Both the cloud and on-premises systems have their advantages and disadvantages, but recent attacks against on-premise systems coupled with the proliferation and advancement of cloud-based IT architecture are tilting the scales in favor of the cloud. A company that owns its own on-premises servers has more control over security, but are responsible for all of […]

Read More

Azure AD Unmanaged Accounts

What IT Admins Need To Know About the Azure Cosmos DB Vuln

August 31, 2021 Zachary Comeau Leave a Comment

Microsoft has released additional guidance to mitigate the cloud vulnerability in the Azure Cosmos DB Jupyter Notebook feature, but reaffirms that only a “subset” of customers who had the feature enabled were vulnerable. Further, no customer data was accessed because of this vulnerability, and impacted customers who’s primary read-write keys may have been impacted were […]

Read More

CISA Software Security

CISA Adds Single-Factor Authentication To List of Bad Practices

August 30, 2021 Alyssa Borelli Leave a Comment

CISA has added the use of single-factor authentication for remote or admin access to its list of “Bad Practices.”

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 77
  • Page 78
  • Page 79
  • Page 80
  • Page 81
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.