• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: data breaches

4 Signs of Cloud Security Hacks and How Safe Networks Respond

Small and medium-sized businesses need well managed network security services to guard cloud-computing capabilities from security hacks.

September 28, 2016 Ed Wynn Leave a Comment

Hackers are waiting to pounce when companies bring their internet and phone infrastructure to the cloud. Cloud security is a daunting concern for small- and medium-sized businesses (SMBs) and their in-house security resources, which are already stretched. SMBs are especially vulnerable to hacks that compromise the confidentiality, accuracy and availability of their information assets. One […]

Read More

The Rise of Ransomware: What Higher Ed IT Teams Need to Know

Ransomware is dangerous to all computer users, but those at colleges and universities are particularly vulnerable.

June 27, 2016 TechDecisions Staff Leave a Comment

Ransomware is dangerous to all computer users, but those at colleges and universities are particularly vulnerable.

Read More

The Internet of Things: New Opportunities Bring New Security Challenges

Connected devices are skyrocketing in popularity in all applications. But will the technology used to protect that data be able to keep up?

March 24, 2016 TechDecisions Staff Leave a Comment

Connected devices are skyrocketing in popularity in all applications. But will the technology used to protect that data be able to keep up?

Read More

How Switching to EMV Enabled POS Equipment Could Save You a Lawsuit

As of October 1, 2015, the financial liability of credit card fraud falls to the merchant in some cases. Read on to learn more.

February 23, 2016 Jonathan Blackwood Leave a Comment

As of October 1, 2015, the financial liability of credit card fraud falls to the merchant in some cases. Read on to learn more.

Read More

Combating Cyber Threats in Higher Education

Even though higher education is getting ahead with new tech tactics, colleges need to be ready to fight against cyber threats.

February 5, 2016 TD Staff Leave a Comment

Even though higher education is getting ahead with new tech tactics, colleges need to be ready to fight against cyber threats.

Read More

Higher Educations Biggest IT Problem in 2016 Is

Higher education expert Susan Grajek reveals higher education's biggest threat in 2016, and how colleges can fight it.

February 1, 2016 Jessica Kennedy Leave a Comment

Colleges can battle against information security threats in 2016 by brushing up on risk management and increasing network education.

Read More

How EDUCAUSE Can Help Your College Get a Better Grip on the Cloud

EDUCAUSE session details how colleges can use tools and strategies to determine the strengths of its Cloud services.

October 26, 2015 Jessica Kennedy Leave a Comment

The EDUCAUSE session Cloud 101: Tools and Strategies for Evaluating Cloud Services teaches colleges the skills they need to evaluate and strengthen its Cloud Services.

Read More

2 Cyberthreat Vulnerabilities Colleges Need to Worry About This School Year

ThreatMetrix reveals the top 2 cyberthreats colleges needs to look out for during the new academic year.

September 10, 2015 TD Staff Leave a Comment

ThreatMetrix reveals the top 2 cyberthreats colleges needs to look out for during the new academic year.

Read More

The Challenges of Security in Office Environments

Keeping sensitive information secure goes past the network. Eavesdroppers can be as troublesome as hackers.

August 19, 2015 TD Staff Leave a Comment

While companies almost always safeguard their offices with access control, surveillance and other security measures, while at the same time utilizing software to safeguard data in their network, there is a third danger that is almost always overlooked. Verbal disclosure of sensitive data can be overheard and used to cause just as much damage as a data breach. Sound masking can help to alleviate this danger.

Read More

Beat the Breach: How to Strengthen Your College’s Network Security

Network experts reveal why college networks are juicy targets for hackers, and how schools can tighten network security before a fresh attack.

April 20, 2015 Jessica Kennedy Leave a Comment

Just because a college has its physical security squared away doesn’t mean their cybersecurity is up to par. Network experts reveal why college networks are juicy targets for hackers, and how schools can tighten network security before a fresh attack. Experts say that colleges should accept breaches as they come, but learn to harden their defenses, increase interoperability and react immediately to cut a threat off at its source.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 18
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.