• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
Google Cybersecurity Certificate

What To Do When End Users Won’t Complete Cybersecurity Training

August 6, 2021 Zachary Comeau Leave a Comment

Your organization’s employees are required once a year to complete some form of cybersecurity training, which might include a short online course, training videos and a test to wrap it all up. Whether that model of training is adequate in today’s cyber climate is another question, but what if employees aren’t even taking that rudimentary […]

Read More

Fix These Human Vulnerabilities

August 5, 2021 Alyssa Borelli Leave a Comment

Remote workers, distracted and cognitively taxed under the stresses of the pandemic may have been more likely to click on threats.

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

What You Need To Know About Vulnerabilities and Data Breaches in 2021

August 5, 2021 Zachary Comeau Leave a Comment

A pair of new reports from Risk Based Security find that disclosed software and hardware vulnerabilities continue to increase while reported data breaches in most parts of the world decline. For IT administrators struggling to keep pace with the rapid changes in cybersecurity, the reports provide some useful insight into exactly what you’re up against. […]

Read More

Kubernetes

How To Harden Your Kubernetes Infrastructure From Cyberattacks

August 4, 2021 Zachary Comeau Leave a Comment

The U.S. National Security Agency and Cybersecurity and Infrastructure Security Agency has released a guide that can help IT administrators and cybersecurity professionals minimize risk in Kubernetes environments as attacks targeting the open-source system are increasing. The guide comes as threat actors are looking for new ways into IT networks, including Kubernetes via supply chain […]

Read More

cyber insurance concept

What is Cyber Insurance & What Does It Cover?

August 4, 2021 Alyssa Borelli Leave a Comment

Cyber attacks are increasing making it harder to get cyber insurance; it’s not just an IT challenge – it’s a mainstream business issue.

Read More

managers should use positive reinforcement

IT Managers: Stop Blaming & Use Positive Reinforcement Instead

August 3, 2021 Alyssa Borelli Leave a Comment

When cyber incidents happen, managers shouldn’t blame employees, but must rethink their approach using positive reinforcement.

Read More

Kaseya

Security Is A Top IT Priority, But Patch Management Needs To Catch Up

August 3, 2021 Zachary Comeau Leave a Comment

Given the attention cybersecurity has gotten over the last year and a half, it’s no surprise that security is among the top IT areas where companies are investing, according to Kaseya’s 2021 Operations Survey. The IT management software company – which itself early last month was the subject of a massive ransomware supply chain attack […]

Read More

Remote Desktop Management

Top 5 Features to Look for in a Remote Desktop Management Solution

August 3, 2021 By Maxime Trottier Leave a Comment

In a typical workday — which, alas, often extends into a work evening or work weekend— sysadmins connect to remote systems using Remote Desktop Protocol (RDP), PuTTY, SSH, FTP, Telnet, browser-based apps, virtual private networks (VPNs), proprietary software, and many other solutions. To suggest that these tools are important is an understatement. They are essential, […]

Read More

Progress MOVEit vulnerability

Yes, Ransomware Attacks Are Increasing At An Alarming Rate

August 3, 2021 Zachary Comeau Leave a Comment

Ransomware and other cyberattacks have been front and center in news cycles of late, but is the issue just getting more attention, thus the renewed emphasis on stopping it? That answer is an emphatic ‘no,’ according to SonicWall, which says in a new report that ransomware attacks skyrocketed in the first half of 2021, surpassing […]

Read More

Phishing

Microsoft Warns of Sneaky Phishing Campaign

August 2, 2021 Zachary Comeau Leave a Comment

Microsoft is warning of an active phishing campaign that uses a combination of techniques to evade detection and trick users into giving up their credentials. In a series of Tweets and updates on GitHub, Microsoft’s security team says the active phishing campaign uses a “craft combination” of legitimate-looking original sender email addresses, spoofed display sender […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 80
  • Page 81
  • Page 82
  • Page 83
  • Page 84
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.