• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: cyber

government cyberattacks Google Microsoft

Who Got Hacked This Week? June 3 Edition

What types of cyberattacks were carried out this week, June 3, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

June 3, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, June 3, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

Week in Review: Office 365, 5 F’s of AV Design, Data Loss, etc.

This week, May 27th-31st, 2019: Filling the gaps of Office 365 governance, the 5 F’s to better AV design, a Q&A on data loss and response, and more.

May 31, 2019 TechDecisions Staff Leave a Comment

This week, May 27th-31st, 2019: Filling the gaps of Office 365 governance, the 5 F’s to better AV design, a Q&A on data loss and response, and more.

Read More

data loss and response platforms

Q&A: An Opinion on Data Loss Detection and Response Platforms

Antonio Garcia of cybersecurity service provider GRA Quantum explains how they utilize data loss and response platforms before recommending to customers.

May 29, 2019 TechDecisions Staff Leave a Comment

In a world of ever-evolving threats, organizations must be able to protect data regardless of where it travels while enabling collaboration and information sharing, so people can get work done. To react to today’s problems and proactively anticipate tomorrow’s, it takes a whole new set of rules, especially as more businesses push data into public […]

Read More

Office 365, O365, governance hierarchy

Setting Up O365 as A Unique Layer In Your Governance Hierarchy

We explore gaps that your new O365 Governance Framework should address while acknowledging components covered by your existing governance hierarchy.

May 28, 2019 Jack Wilson Leave a Comment

The Microsoft Office 365 environment boasts a spectrum of components, some of which can be managed by your organization’s existing frameworks. However, other components of the O365 environment may require the development of a unique governance hierarchy framework. Organizations implement varying levels of governance hierarchy frameworks to align strategy, policies, and procedures. At the highest […]

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? May 23 Edition

What types of cyberattacks were carried out this week, May 23, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

May 23, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, May 23, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

edge computing

Atos Edge Computing Server Processes and Analyzes Data at the Edge in Real Time

Server is ideally suited for manufacturing 4.0, healthcare and retail and airport security.

May 23, 2019 Lisa Montgomery Leave a Comment

Server is ideally suited for manufacturing 4.0, healthcare and retail and airport security.

Read More

Internet of Things

City of Baltimore Held Hostage by Ransomware for Weeks

A ransomware attack on the city of Baltimore is ongoing, and has held up the city’s infrastructure for two weeks.

May 22, 2019 Jonathan Blackwood Leave a Comment

A ransomware attack on the city of Baltimore is ongoing, and has held up the city’s infrastructure for two weeks.

Read More

Google Cybersecurity Certificate

Security Admins: Know The Value of Security Orchestration Automation Response (SOAR)

The right Security Orchestration Automation Response (SOAR) system could cut through the clutter and reveal the real threats.

May 22, 2019 Jonathan Blackwood Leave a Comment

It isn’t easy being a security operations analyst. Every company needs a cybersecurity portfolio, and the threats out there only continue to grow. Almost daily we see a new attack that costs an organization capital, reputation, or both. Security Orchestration Automation Response (SOAR) tools could provide aid to organizations buried by the potential threats out […]

Read More

Sophos Cybersecurity Trends

3 Ways to Prevent Data Breaches

Some alarming statistics on the prevalance of data breaches -- and some sound strategies on how to prevent them at your organization.

May 21, 2019 Dan Kiehl Leave a Comment

It seems like every day in the news you read about another data breach. According to a study published by IBM, an organization has a 27% chance of suffering a breach of at least 1,000 records. There have been so many data breaches  in the past several years that now it seems commonplace. “According to […]

Read More

Warren the Lone Presidential Candidate Using Basic Email Security

Most of the 2020 presidential hopefuls—including the sitting president—are not properly securing their email addresses.

May 21, 2019 Sam Harton Leave a Comment

Most of the 2020 presidential hopefuls—including the sitting president—are not properly securing their email addresses.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 197
  • Page 198
  • Page 199
  • Page 200
  • Page 201
  • Interim pages omitted …
  • Page 237
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.