• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: malware

Oregon Prisons Ban Computer Programming Books

Part of the Oregon Department of Corrections’ push for tougher security includes banning basic guides to computer programming.

July 11, 2019 Sam Harton Leave a Comment

Part of the Oregon Department of Corrections’ push for tougher security includes banning basic guides to computer programming.

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? July 1 Edition

What types of cyberattacks were carried out this week, July 1, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

July 1, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, July 1, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

data leak

Data Leak Exposes 85GB of Security Logs of Major Hotel Chains

The Pyramid Hotel Group experiences data leak, leaving Marriott and several other hotels at risk.

June 28, 2019 Lisa Montgomery Leave a Comment

The Pyramid Hotel Group experiences data leak, leaving Marriott and several other hotels at risk.

Read More

smb cloud security, SMBs, smb security risks

IoT Growth is Great, But It’s Causing SMB Security Risks

SMB security risks are more numerous in this age of IoT expansion. Here are the most prominent challenges to security caused by new developments in tech.

June 26, 2019 Terry Hearn Leave a Comment

As small businesses continue to battle traditional issues of time and resources, the rapid growth of the Internet of Things (IoT) is adding SMB security risks for teams to manage. While there are certainly many benefits to implementing IoT in terms of efficiency and logistics, such a rapid growth in the number of endpoints connected to […]

Read More

Trust but Verify, Zero Trust Security

3 Cybersecurity Companies That Don’t Trust “Trust but Verify”

Do you still trust the "Trust but Verify" model of cyber security? These companies don't, and neither should you, says a "Zero Trust Security" proponent.

June 19, 2019 TechDecisions Staff Leave a Comment

Gone are the days of “Trust but Verify,” the framework made obsolete by an increasingly-malicious digital threatscape, says cloud columnist Louis Columbus in this Forbes article. Now, he says, it’s all about “Zero Trust Security,” something that emphasizes a “never trust, always verify, enforce least privilege” approach to cybersecurity. In his article, Columbus exemplifies ten cybersecurity […]

Read More

Internet of Things

City of Baltimore Held Hostage by Ransomware for Weeks

A ransomware attack on the city of Baltimore is ongoing, and has held up the city’s infrastructure for two weeks.

May 22, 2019 Jonathan Blackwood Leave a Comment

A ransomware attack on the city of Baltimore is ongoing, and has held up the city’s infrastructure for two weeks.

Read More

USB killers

Are Your Classrooms Safe from ‘USB Killers’?

These 'USB Killers' destroyed 66 computers last month during just one incident -- and there've been many. What does this mean for school tech security?

May 16, 2019 Paul Konikowski Leave a Comment

A former student of the College of St. Rose in New York pled guilty to destroying “66 computers as well as numerous monitors and digital podiums containing USB data ports owned by the College.” The damage was done using a “USB Killer” device that discharged high voltage pulses into the host device, damaging the host’s electrical […]

Read More

cyberattacks

Is Your Email Safe from Cyberattacks?

Email-based cyberattacks are on the rise; enterprises need cloud-based protection solutions.

April 24, 2019 Lisa Montgomery Leave a Comment

Email-based cyberattacks are on the rise; enterprises need cloud-based protection solutions.

Read More

Mattermost Microsoft Teams

Microsoft Discovers Bad Driver in Huawei Systems

The tech giant discovered a driver in certain MateBook systems that let certain users have privileges that they weren’t supposed to have.

April 23, 2019 Sam Harton Leave a Comment

The tech giant discovered a driver in certain MateBook systems that let certain users have privileges that they weren’t supposed to have.

Read More

Office Depot Fined For Deceiving Customers

The office supplies corporation along with a partner company scammed numerous customers into buying unnecessary services.

April 18, 2019 Sam Harton Leave a Comment

The office supplies corporation along with a partner company scammed numerous customers into buying unnecessary services.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 33
  • Page 34
  • Page 35
  • Page 36
  • Page 37
  • Interim pages omitted …
  • Page 47
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.