• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: data breaches

digital

Stumped Over How to Institute Digital Policies?

New handbook offers advice on minimizing risk and maximizing opportunity in the digital age.

April 3, 2019 Lisa Montgomery Leave a Comment

New handbook offers advice on minimizing risk and maximizing opportunity in the digital age.

Read More

NTT Predictions, Phygital

Russia is Disconnecting from the Internet Soon. Here’s Why.

Russia will soon conduct an disconnection experiment to boost the independence of its internet, Runet.

February 26, 2019 Jessica Messier Leave a Comment

Russia will soon conduct an disconnection experiment to boost the independence of its internet, Runet.

Read More

Proofpoint CISO, CISOs cyberattack

New Ways We Might Get Hacked in 2019

Relying on AI, old and new methods, hackers will be kicking up their attack strategies this year.

January 23, 2019 Jessica Messier Leave a Comment

Relying on AI, old and new methods, hackers will be kicking up their attack strategies this year.

Read More

Proofpoint CISO, CISOs cyberattack

Report Shows Equifax Could Have Prevented 2017 Breach

Equifax left almost 150 million people’s information vulnerable to attackers in 2017, and a recent report claims this would have been easily avoidable.

January 2, 2019 Sam Harton Leave a Comment

Equifax left almost 150 million people’s information vulnerable to attackers in 2017, and a recent report claims this would have been easily avoidable.

Read More

Expel MDR for Kubernetes, cloud

Leading The Way in Discussions for National Privacy Laws

With the massive amounts of data being collected and analyzed – and a number of companies abusing the use of that data recently – is it time to introduce privacy laws to keep information safe?

December 10, 2018 Matt Dumiak Leave a Comment

With the massive amounts of data being collected and analyzed – and a number of companies abusing the use of that data recently – is it time to introduce privacy laws to keep information safe?

Read More

McAfee ransomware attack

Why Work with Vendors That Don’t Exhibit Cybersecurity Awareness?

If you're truly protective of your network, it's best to avoid working with vendors that don't exhibit cybersecurity awareness and don’t demonstrate cybersecurity measures in their digital interactions.

November 7, 2018 Tom LeBlanc Leave a Comment

The gateway for that cyber crime was through an HVAC contractor that worked with the retailer, Simopoulos pointed out.

Read More

cybersecurity Proofpoint compliance

What’s Your Action Plan to Battle Cybersecurity Attacks?

CompliancePoint offers suggestions on how to build a security awareness program to reduce cybersecurity issues.

October 17, 2018 Lisa Montgomery Leave a Comment

CompliancePoint offers suggestions on how to build a security awareness program to reduce cybersecurity issues.

Read More

Facebook Photos

EU Imposes First GDPR Notice on Facebook

The social media giant, Facebook, was involved in a scandal that led to 87 million users’ data being used without their consent, and the GDPR took notice.

October 16, 2018 Sam Harton Leave a Comment

The social media giant, Facebook, was involved in a scandal that led to 87 million users’ data being used without their consent, and the GDPR took notice.

Read More

When It Comes to Passwords, Symbols Are Out, Voice Activation is In

Microsoft declared an end to passwords, and a welcome to voice-activated logins.

October 15, 2018 Jessica Messier Leave a Comment

Microsoft declared an end to passwords, and a welcome to voice-activated logins.

Read More

iOS macOS vulnerabilities

Overcoming the Cybersecurity Dangers of BYOD

In today’s high tech world, nearly everyone you meet owns a smartphone, tablet or laptop computer. And in the era of BYOD, any and all of these devices are being used for work.

September 6, 2018 Kim Del Fierro Leave a Comment

In today’s high tech world, nearly everyone you meet owns a smartphone, tablet or laptop computer. And in the era of BYOD, any and all of these devices are being used for work.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 15
  • Page 16
  • Page 17
  • Page 18
  • Page 19
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.