• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: data breaches

unchecked admin accounts, best practices

The Hidden Dangers of Unchecked Admin Accounts

Unchecked admin accounts are a danger to your organization's business: by not monitoring admins, you're leaving a door wide open to data threats.

August 29, 2019 Mitesh Patel Leave a Comment

So long as a user account is live and operative within your IT infrastructure, it is a potential gateway into your organization and makes it as easy as leaving a back window open into any device or application on your network being used via that account. Not having a clear record of all unchecked admin […]

Read More

Malware Google Authenticator

The United States is ‘Not Prepared’ for Serious Cyber Attacks and Politicians are Asking Hackers for Help

According to a panelists of US congresspeople and ethical hackers, the United States government is not prepared for serious cyber attacks.

August 16, 2019 Adam Forziati Leave a Comment

Politicians at the DEF CON hacking conference implored ethical hackers to take up the fight against serious cyber attacks — something they said the United States is still underprepared for. According to this article from The Register, a UK-based publication, US representatives Ted Lieu (D-CA) and James Langevin (D-IL) were joined by hackers Cris Thomas, aka Space […]

Read More

most important cybersecurity training tips

Stay Protected: 5 of the Most Important Cybersecurity Training Tips For Your Employees

We highlight the most critical cybersecurity training tips for employees because every business, whether big or small, experiences cyber threats.

August 6, 2019 David Share Leave a Comment

It is believed that the most sophisticated cyber attacks are the biggest threats to any organization. However, the biggest cybersecurity threat to a business is the people that work there. In fact, eight out of ten top data theft are as a result of human error. This means you could probably stand to receive a […]

Read More

new electoral systems, 2020 election security

Pennsylvania Counties Spending Money on Potentially Insecure New Electoral Systems

Pennsylvania's new electoral systems could be insecure, given that they're run by almost-outdated Windows 7 processing. How will other states respond?

July 18, 2019 TechDecisions Staff Leave a Comment

Pennsylvania is taking election hacking seriously, spending federal money on new electoral systems. But are those systems secure? According to a recent report on the Associated Press, many of the new systems run on outdated software which is vulnerable to hackers. The majority of the election jurisdictions nationwide use Windows 7 or older operating systems […]

Read More

Week in Review: Connected Apps and IIoT, Online Privacy, etc.

This week, July 8th – 12th, 2019: the value of connected applications to IIoT, online privacy facts, the internet fustercluck, and more.

July 12, 2019 TechDecisions Staff Leave a Comment

This week, July 8th – 12th, 2019: the value of connected applications to IIoT, online privacy facts, the internet fustercluck, and more.

Read More

online privacy facts

10 Online Privacy Facts That May Surprise You

Cyberattacks, data breaches, & hacking attempts are eye-openers as most of them are unexpected. Here are online privacy facts which will still surprise you.

July 11, 2019 Susan Alexandra Leave a Comment

With the continuous growth of internet users, the risk of privacy breaches has increased. The information we share about ourselves at different times and occasions are often stored permanently and stayed there even after a long time. Tracing someone through the information available online is quite easy and so is causing harm to them. The […]

Read More

smb cloud security, SMBs, smb security risks

IoT Growth is Great, But It’s Causing SMB Security Risks

SMB security risks are more numerous in this age of IoT expansion. Here are the most prominent challenges to security caused by new developments in tech.

June 26, 2019 Terry Hearn Leave a Comment

As small businesses continue to battle traditional issues of time and resources, the rapid growth of the Internet of Things (IoT) is adding SMB security risks for teams to manage. While there are certainly many benefits to implementing IoT in terms of efficiency and logistics, such a rapid growth in the number of endpoints connected to […]

Read More

Defendify cybersecurity platform

Why Investors Put Over a Million into the Defendify Cybersecurity Platform

The Defendify cybersecurity platform just received major backing from investors. Here's what separates it from other solutions on the market.

June 20, 2019 Adam Forziati Leave a Comment

Over half of small businesses in the U.S. said they’ve experienced some kind of cyberattack within the past 12 months, says a Hiscox Cyber Readiness Report. Yet many lack a way to alert, diagnose, and solve these security concerns in a holistic way — and for a reasonable price. Recent funding gained by Defendify, a SaaS-delivered […]

Read More

Trust but Verify, Zero Trust Security

3 Cybersecurity Companies That Don’t Trust “Trust but Verify”

Do you still trust the "Trust but Verify" model of cyber security? These companies don't, and neither should you, says a "Zero Trust Security" proponent.

June 19, 2019 TechDecisions Staff Leave a Comment

Gone are the days of “Trust but Verify,” the framework made obsolete by an increasingly-malicious digital threatscape, says cloud columnist Louis Columbus in this Forbes article. Now, he says, it’s all about “Zero Trust Security,” something that emphasizes a “never trust, always verify, enforce least privilege” approach to cybersecurity. In his article, Columbus exemplifies ten cybersecurity […]

Read More

Parasoft dotTEST Jtest

Parasoft Jtest and dotTEST Show Software Security and Compliance Concerns in Real Time

Parasoft Jtest and dotTEST are newly-updated Java and .NET dev testing solutions that feature built-in alerts, tutorials, & a centralized reporting dashboard

May 23, 2019 TechDecisions Staff Leave a Comment

Automated software testing company Parasoft announces the latest releases of Parasoft Jtest and dotTEST, their Java and .NET dev testing solutions, respectively. The solutions combine static analysis, security testing, unit testing, and code coverage analysis to help users maximize app quality and security while minimizing business risks. According to Parasoft, the updated releases (10.4.2) focus […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 14
  • Page 15
  • Page 16
  • Page 17
  • Page 18
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.