• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Network Security

What good is the IT network at your organization if it isn’t secure? Learn about technology to prevent cyberattacks, store and recover data, secure your WiFi and remote capabilities, and more.

Popular Tags within: Network Security

Cloud InfoComm Videoconferencing Education AI Microphones UCC Mass Notification Generative AI IT
IBM Data Breach Study

IBM Study: Average Cost of Data Breach $3.86M

August 31, 2020 Zachary Comeau Leave a Comment

It’s no secret that data breaches are a nuisance and an unfortunate part of doing business. And, according to a new IBM study, they are expensive. The 2020 Cost of a Data Breach Report, sponsored by IBM Security and conducted by the Ponemon Institute, found that data breaches cost companies $3.86 million on average, and […]

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? August 31 Edition

August 31, 2020 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, August 31, 2020? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

Crestron 4-Series

Crestron Releases 4-Series Control Systems

August 31, 2020 TD Staff Leave a Comment

The number of devices and building systems on networks continues to increase, as does the need to intelligently and efficiently control various technologies. Crestron says it has the ideal solution with its just-released line of 4-Series control systems, which the company calls “the fastest, most powerful and secure the company has ever built” in today’s […]

Read More

Rahi Platform as a Service

Elevate Subscription Services by Rahi is an End-to-End, Global Platform as a Service

August 28, 2020 TechDecisions Staff Leave a Comment

Global IT Solutions Provider Rahi has announced its new end-to-end global Platform as a Service called Elevate Subscription Services by Rahi. The service will deliver elastic subscription-based technology frameworks that cover Networking, Security, A/V Collaborations, and Managed Services. More from the company: ESS by Rahi is currently the only PaaS model available on the market […]

Read More

Internet Explorer

Microsoft to Finally End Support for Internet Explorer

August 24, 2020 Zachary Comeau Leave a Comment

By this time next year, Microsoft will no longer support Internet Explorer, the company announced earlier this month. On Nov. 30 of this year, the Microsoft Teams web app will no longer support Internet Explorer 11, and by Aug. 17, 2021, all remaining Microsoft 365 apps and services will no longer support the internet browser. […]

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? August 24 Edition

August 24, 2020 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, August 24, 2020? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

Slack Canvas

Slack Announces Improved Security Features

August 13, 2020 Zachary Comeau Leave a Comment

Slack is upgrading the communication and collaboration app’s security features including Slack Connect, a new feature that the company says will allow for faster communication, stronger relationships and improved security. Slack Connect, which the company calls “a more secure and productive way for organizations to communicate wit each other,” gives admins the ability to maintain […]

Read More

Intelligent Assistant Regional Accent Alexa

Research: Alexa Devices Vulnerable to Hacking

August 13, 2020 Zachary Comeau Leave a Comment

New research from Check Point suggests that Alexa is not as secure as we thought. Alexa, Amazon’s virtual assistant which is becoming a larger presence in the enterprise, is not immune to outside attacks because its subdomains are vulnerable to Corss-Origin Resource Sharing (CORS) misconfiguration and Cross Site Scripting, Check Point researchers wrote. “Using the […]

Read More

Progress MOVEit vulnerability

Another School Ransomware Attack in Kansas

August 13, 2020 Adam Forziati Leave a Comment

We’re seeing a recent rise in school ransomware attacks as reported by our colleagues over at Campus Safety. The Metropolitan Community College of Kansas City (MCCKC) announced on Wednesday that they were the victim of a ransomware attack and that some data had been encrypted. A hacker may have had access to student and employee […]

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? August 10 Edition

August 10, 2020 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, August 10, 2020? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 94
  • Page 95
  • Page 96
  • Page 97
  • Page 98
  • Interim pages omitted …
  • Page 166
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.