• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: mfa

Increasing Cyber Attacks

Now Is the Time to be Vigilant Amidst Increasing Cyber Attacks

As the COVID-19 pandemic and political turmoil lead to increasing cyber attacks, organizations and end users should take extra precaution.

September 15, 2020 Zachary Comeau Leave a Comment

While remote work and working from home are convenient and just a way of life these days, the trend is opening the door to cyber attackers, nation states and part-time hackers to take advantage of the hysteria and cast a wide net in a bid to compromise our networks. Across the board, companies are reporting […]

Read More

Microsoft Exchange Server Attacks

Microsoft Warns Against Advanced Server Takeover Attacks

Microsoft is warning users of increasing attacks on Exchange servers after picking up on a trend of advanced server compromise attacks in April.

June 25, 2020 Zachary Comeau Leave a Comment

Microsoft is warning users of increasing attacks on Exchange servers after picking up on a trend of advanced server compromise attacks in April. The company is urging users and organizations to apply the latest security patches, keep antivirus and cybersecurity software enabled, review roles and groups to ensure no unauthorized accounts have been added or […]

Read More

Office 365 Cybersecurity

U.S. Cybersecurity Officials Warn of Attacks on Hastily Deployed Office 365 Solutions

The Department of Homeland Security says organizations may have deployed Office 365 applications for its remote workforce without considering cybersecurity.

April 30, 2020 Zachary Comeau Leave a Comment

Organizations’ rush to build up remote work programs and deploy cloud-based collaboration solutions may have jeopardized their cybersecurity, says a new alert from the U.S. Department of Homeland Security. In an advisory through the department’s Cybersecurity and Infrastructure Agency, the government warns that quick rollouts of cloud services like Microsoft 365 – with applications like […]

Read More

Ping Identity Workforce360 Customer 360
Featured Video Play Icon

Ping Identity Announces New Workforce and Customer Authentication Solutions for Digital Enterprises

Workforce360 & Customer 360 Ping Identity packages aimed at accelerating transformation, improving UX, & enabling zero trust & passwordless authentication.

March 10, 2020 TechDecisions Staff Leave a Comment

Ping Identity announces two new solution packages for enabling centralized authentication services which can span an entire enterprise. The new solutions include single sign-on (SSO), multi-factor authentication (MFA), user directory, and Ping Professional Services that enable customer and workforce digital experiences. Customer360 and Workforce360 are now available with flexible cloud options. Customer 360 Ping’s new […]

Read More

Trust but Verify, Zero Trust Security

3 Cybersecurity Companies That Don’t Trust “Trust but Verify”

Do you still trust the "Trust but Verify" model of cyber security? These companies don't, and neither should you, says a "Zero Trust Security" proponent.

June 19, 2019 TechDecisions Staff Leave a Comment

Gone are the days of “Trust but Verify,” the framework made obsolete by an increasingly-malicious digital threatscape, says cloud columnist Louis Columbus in this Forbes article. Now, he says, it’s all about “Zero Trust Security,” something that emphasizes a “never trust, always verify, enforce least privilege” approach to cybersecurity. In his article, Columbus exemplifies ten cybersecurity […]

Read More

data breaches

Data Breaches: An Inside Job?

Privileged access abuse is on the rise and could be responsible for serious data breaches.

May 3, 2019 Lisa Montgomery Leave a Comment

Privileged access abuse is on the rise and could be responsible for serious data breaches.

Read More

CES 2019

IBM CEO Ginni Rometty to Deliver CES 2019 Opening Keynote

Rometty’s keynote at CES 2019 to highlight what’s next in artificial intelligence, blockchain, and quantum computing.

January 9, 2019 Lisa Montgomery Leave a Comment

Rometty’s keynote at CES 2019 to highlight what’s next in artificial intelligence, blockchain, and quantum computing.

Read More

New Fire Detection Devices from Honeywell

Honeywell says the redesigned line of fire detection devices offers improved system reliability against false alarms, expanded color offerings and modern design.

September 4, 2018 TechDecisions Staff Leave a Comment

Honeywell says the redesigned line of fire detection devices offers improved system reliability against false alarms, expanded color offerings and modern design.

Read More

New AuthPoint Multifactor Authentication from WatchGuard

Designed specifically for SMBs in search of affordable, easy-to-use security tools, AuthPoint is WatchGuard’s first entirely software-based solution, and utilizes the new WatchGuard Cloud management console. 

August 1, 2018 Rich Freeman Leave a Comment

Designed specifically for SMBs in search of affordable, easy-to-use security tools, AuthPoint is WatchGuard’s first entirely software-based solution, and utilizes the new WatchGuard Cloud management console. 

Read More

Cyber Security

Cybersecurity Practices for the Layman Employee

When it comes to cybersecurity, one of the biggest threats to your organization is an uneducated employee. Here are some tips for the laymen on cybersecurity practices.

April 23, 2018 Albert J. Gyomber Leave a Comment

When it comes to cybersecurity, one of the biggest threats to your organization is an uneducated employee. Here are some tips for the laymen on cybersecurity practices.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.