• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Latest Content

How Does a Cyber Attack Work?

Hacking and cyber attacks are threats that should concern every company. Here's how they work.

January 17, 2017 Colleen Frye Leave a Comment

Cyber Attack

You work in the financial department of your company and you just got an email from a C-level executive. It tells you to pay an invoice of $78,000 before 1 p.m., and includes instructions for how to wire the money to your vendor’s bank. You send the money, as requested, and it quickly moves to […]

Filed Under: Network Security Tagged With: Antivirus, Cyber Attacks, Cyber Security, Malware Protection

How to Protect Your Business from Dangerous Spam and Phishing Emails

Spam and phishing attacks can cripple a company. Keep your business safe with these tips.

January 16, 2017 Jeff Olejnik 3 Comments

There are not many ways to break into a bank; however, gaining access to personal bank accounts is becoming a very common way for criminals to get in.  One way this is achieved is by clicking on a link within an email.  Spam is very cost effective for cyber criminals, as emailing is a near […]

Filed Under: Network Security Tagged With: Corporate, Cyber Attacks, Email

The Dos and Don’ts of Writing a Technology RFP (Request for Proposal)

Writing a request for proposal is the first step to getting a new technology integrated into your enterprise. However, there is no standard for writing them. We spoke with leading integrators to learn what to do and what not to do when writing an RFP.

January 16, 2017 Jonathan Blackwood 2 Comments

Writing a request for proposal is the first step to getting a new technology integrated into your enterprise. We spoke with leading integrators to learn what to do and what not to do when writing an RFP.

Filed Under: Compliance Tagged With: Corporate, Integration, Regulations

Capacity Planning With No Risk

Increasing storage capacity without the risk comes to scaling out, not up.

January 15, 2017 Mara McMahon Leave a Comment

Planning for storage capacity is a critical issue for cloud and hosting service providers, and not doing it the right way can impact business growth and profitability. To be able to cater to performance-sensitive workloads as well as support a broader set of business applications in multitenant environments, service providers are turning to all-flash arrays. […]

Filed Under: IT Infrastructure Tagged With: Data Collection, Storage

Who Got Hacked This Week? Jan. 14 Edition

Who and what was hacked this week, January 14th, 2016? Read on to find out.

January 14, 2017 Jonathan Blackwood Leave a Comment

Who Got Hacked

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.   OSCE Suffers Major Cyber Attack The Organization for Security and Co-operation in Europe has suffered a major cyberattack this week. Based in Vienna, the OSCE includes 57 member states […]

Filed Under: Network Security Tagged With: Cyber Attacks, Cyber Security

Indiana University Digital Displays

January 13, 2017 TechDecisions Staff Leave a Comment

Students have a choice, and when it comes to their university tuition is not the only deciding factor. For millennial students, those who have grown up with a smart phone in their pocket, digital innovation is a major deciding factor. With the opportunity to upgrade not one, but two buildings, Indiana University had quite a […]

Filed Under: Project of the Week, Video Tagged With: Digital Signage, Display

Google Releases Free Toontastic 3D Storytelling App

The free app will allow children of all ages to create illustrated stories for school projects and free play.

January 12, 2017 TechDecisions Staff Leave a Comment

Today’s digital devices and tools offer amazing opportunities for kids to imagine, invent and explore with technology—and perhaps most important of all, have fun. Over the years, Google has worked closely with educators to build programs for kids to create through code, doodle their dreams, explore exotic locales with virtual reality, and even tour the […]

Filed Under: Mobility Tagged With: Apps, K12

Maintaining Productivity in a Digital, Mobile Workplace

The modern workplace comprises a sea of devices and highly mobile employees – but they need the ability to print from anywhere for them to be truly effective.

January 12, 2017 Brent Richtsmeier Leave a Comment

If office workers of the 1950s could board a time machine and travel to the present day, they would be flummoxed by what they would encounter. Instead of scarred metal desks holding typewriters, notepads and pens, and rotary phones, they would be confronted with a multitude of screens – PC, laptop, smartphone, tablet, wearable – […]

Filed Under: Mobility Tagged With: BYOD, Corporate

How a Makerspace Brought Our School Together on a Budget

Transforming half of the library into a ‘fluid space’ helped an elementary school foster a culture of inclusivity and creativity.

January 11, 2017 Jennifer D. Goldman 1 Comment

About five years ago, my school, Mountain View Elementary in Simi Valley, CA, was on the verge of closing down due to declining enrollment. I had just taken over as principal after a career spent not in administration but in school psychology and supporting programs for special needs students. But already I could see things […]

Filed Under: Compliance Tagged With: Curriculum, K12, Policy

The Ultimate Guide to Corporate Cyber Security

Cyber security can be confusing, but after reading our article you'll be in the clear and ready to stay safe.

January 10, 2017 TechDecisions Staff 14 Comments

government cyberattacks Google Microsoft

Cyber Security is hard to get a handle on. Ask even the most sophisticated experts. It’s constantly evolving and changing. Cyber criminals are coming up with new exploits as quickly as companies are able to patch them up. Cyber security is a constant battle between the “good guys” and the “bad guys.” In this case, […]

Filed Under: IT Infrastructure Tagged With: Antivirus, Corporate, Cyber Attacks, Cyber Security, Internet of Things, Malware Protection

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 1236
  • Page 1237
  • Page 1238
  • Page 1239
  • Page 1240
  • Interim pages omitted …
  • Page 1393
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.