• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: data breaches

Cyber Security

Hacking is a Lucrative Endeavor on Both Sides of the Law

While black-hat hacking is leading to some of the most costly ransomware attacks in history, companies are shelling out money for white-hat hacking to improve cybersecurity.

February 15, 2018 Allan Colombo Leave a Comment

While black-hat hacking is leading to some of the most costly ransomware attacks in history, companies are shelling out money for white-hat hacking to improve cybersecurity.

Read More

Cyber Security

ADT and JCI Offer Education on Cybersecurity Tactics

ADT hosts webinar to help organizations defend against cyberattacks while JCI offers new program for National Cybersecurity Awareness Month.

October 23, 2017 Rodney Bosch Leave a Comment

ADT hosts webinar to help organizations defend against cyberattacks while JCI offers new program for National Cybersecurity Awareness Month.

Read More

Avast Software Brings New Capabilities to AVG Managed Workplace

The new capabilities from Avast Software’s AVG managed Workplace update will allow for evaluation of password policies, patch management, and anti-virus software.

August 16, 2017 Rich Freeman Leave a Comment

The new capabilities from Avast Software’s AVG managed Workplace update will allow for evaluation of password policies, patch management, and anti-virus software.

Read More

AV Analytics Will Help Your Business Whether Integrators like It or Not

Professional AV is moving toward data-based environments that could deliver end users increased value with AV analytics opportunities, but are integrators ready to realize them?

July 18, 2017 Dan Daley Leave a Comment

Professional AV is moving toward data-based environments that could deliver end users increased value with AV analytics opportunities, but are integrators ready to realize them?

Read More

Cyber Security

How Does Fileless Ransomware Work?

Fileless ransomware uses a clever bit of trickery to get around antivirus programs. Here’s how it works.

June 7, 2017 Con Mallon Leave a Comment

Fileless ransomware uses a clever bit of trickery to get around antivirus programs. Here’s how it works.

Read More

How to Implement Proper Network Security Strategies on Campus

There are a number of strategies that campuses can be sure to put into place to strengthen network security and keep a campus secure.

March 23, 2017 Bob Stockwell Leave a Comment

Many security components now function on a campus network, so it is important to add comprehensive safeguards to defend against cyberattacks and data breaches.  It is also critical that we include the core points of vulnerability that potentially exist within the system architecture. Let’s review the basics and focus on the essential issues that make […]

Read More

How to Select the Right Electronic Health Record System

Selecting an electronic health records (EHR) system can be a difficult undertaking for any practice.

February 27, 2017 Nathan Scott Leave a Comment

In a recent post on our site, we discussed some of the important details regarding EHR use under the new MACRA ruling. With the largest percentage (25%) of the MIPS composite score for 2017 being reliant upon the Advancing Care Information category, the replacement for Meaningful Use, it is imperative that practices are using the […]

Read More

Who Got Hacked

Who Got Hacked This Week? Feb. 18 Edition

Who and what was hacked this week, February 18, 2017? Read on to find out.

February 18, 2017 Jonathan Blackwood Leave a Comment

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.   60 Universities and Government Agencies Compromised In December of 2016, Recorded Future discovered an EAC database breach that was the result of SQL Injection. The attack was carried out by […]

Read More

The U.S. Department of State Installs Jetbuilt

December 9, 2016 TechDecisions Staff Leave a Comment

The United States’ federal executive department, the Department of State – responsible for the international relations of the United States – has streamlined their Performance Work Statement within the Video Program Office with Jetbuilt’s Request for Proposal features. The Tech Decision The Video Program Office creates Performance Work Statements, consisting of equipment recommendations with costs […]

Read More

The Importance of the Cloud for Treasury Management Systems

When it comes to changing the way they’ve always done things, financial professionals want to be shown, not told.

November 3, 2016 Mike Zack Leave a Comment

No organization should leap into major changes without thorough analysis and a clear demonstration that what’s being recommended is going to work.  And when we’re talking about the critically important and highly confidential business of treasury management, such skepticism is especially appropriate. Financial data is highly sensitive, after all. If we keep all of our […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 17
  • Page 18
  • Page 19
  • Page 20
  • Page 21
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.