• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Collaboration Cloud InfoComm Videoconferencing Hybrid Work Education AI UCC Microphones Mass Notification
Azure AD Unmanaged Accounts

What IT Admins Need To Know About the Azure Cosmos DB Vuln

August 31, 2021 Zachary Comeau Leave a Comment

Microsoft has released additional guidance to mitigate the cloud vulnerability in the Azure Cosmos DB Jupyter Notebook feature, but reaffirms that only a “subset” of customers who had the feature enabled were vulnerable. Further, no customer data was accessed because of this vulnerability, and impacted customers who’s primary read-write keys may have been impacted were […]

Read More

CISA Software Security

CISA Adds Single-Factor Authentication To List of Bad Practices

August 30, 2021 Alyssa Borelli Leave a Comment

CISA has added the use of single-factor authentication for remote or admin access to its list of “Bad Practices.”

Read More

Microsoft Security RSA Conference

Azure Cosmos DB Flaw Exposed Customer Data

August 27, 2021 Zachary Comeau Leave a Comment

Microsoft is warning thousands of its customers of a vulnerability in Azure that left customer data – including for several Fortune 500 companies – completely exposed. Cloud security company Wiz said in lengthy and detailed post that the flaw – dubbed Chaos DB – is in Azure’s Cosmos DB database. A successful exploit would give […]

Read More

iot security dangers, IoT dangers, IoT device security

What You Need To Know About New IoT Vulnerabilities

August 26, 2021 Zachary Comeau Leave a Comment

The IoT has long been thought to be full of gaping vulnerabilities for attackers to exploit, and it’s now becoming a reality as two recently vulnerability disclosures say millions of IoT devices could be at risk and allow attackers to spy on organizations or completely control affected devices. IoT Inspector was the first to disclose […]

Read More

PrintNIghtmare

Still Having A PrintNightmare?

August 25, 2021 Zachary Comeau Leave a Comment

When Microsoft released security patches earlier this month to address the vulnerabilities in Windows Print Spooler service, we thought the flaws known as PrigntNightmare were behind us. However, due to the very patch that Microsoft issued to keep cybercriminals from gaining admin privileges through this vulnerability and other changes, some admins are complaining of printing […]

Read More

Zero Trust

What is Zero Trust and How Do You Implement It?

August 25, 2021 Zachary Comeau Leave a Comment

Thanks to a continuous onslaught of nation-state cyberattacks, exploited vulnerabilities and ransomware, the term Zero Trust has been thrust into the mainstream, but the term isn’t new. In fact, it’s about a decade old, but the ideas and concepts behind the term are even older. However, there isn’t one Zero Trust solution or any one […]

Read More

Microsoft Security RSA Conference

CISA: Cybercriminals Targeting ProxyShell Flaws

August 23, 2021 Zachary Comeau Leave a Comment

System administrators and other IT professionals are urged to apply Microsoft’s May 2021 security updates as threat actors are actively exploiting a previous vulnerability in Microsoft Exchange Server. The U.S. Cybersecurity and Infrastructure Security Agency said over the weekend that multiple threat actors are exploiting three ProxyShell Vulnerabilities, which could allow an attacker to install […]

Read More

Zero Trust, Leostream, AWS

What IT Admins Can Learn From Microsoft’s U.S. Government Zero Trust Strategy

August 18, 2021 Zachary Comeau Leave a Comment

Microsoft this week published a blog post about how the IT giant is helping U.S. federal agencies adopt a Zero Trust architecture and comply with President Joe Biden’s executive order on cybersecurity, and the company’s guidelines should be a framework for any organization to strive towards. The blog comes amid a heightened awareness of cybersecurity […]

Read More

Hackers use morse code to evade detection

Hackers Used Morse Code In This Phishing Attack

August 18, 2021 Alyssa Borelli Leave a Comment

Hackers’ are becoming more sophisticated by using Morse code to evade detection in latest XLS.HTML phishing attack.

Read More

cyberattacks against school districts to increase

How to Mitigate Cyberattacks Against School Districts

August 18, 2021 Alyssa Borelli Leave a Comment

Cybercriminals may have their sights set on school districts in 2021-22 academic year; parents fear leak of student data.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 78
  • Page 79
  • Page 80
  • Page 81
  • Page 82
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.