• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: mfa

Microsoft Windows 11 Copilot

Microsoft to Roll Out Security Defaults to All Microsoft Customers

Microsoft is bringing security defaults to existing customers who haven't rolled out security defaults or Azure AD Conditional Access.

May 27, 2022 Zachary Comeau Leave a Comment

Microsoft has begun rolling out security defaults to existing Microsoft customers who have yet to roll out security defaults or Azure AD Conditional Access, helping tenants created before October 2019 better secure their IT environments. Microsoft introduced security defaults in the fall of 2019 for new tenants, which included multifactor authentication (MFA) and modern auth […]

Read More

1Password Browser Extension

The Most Common Password Used Amongst CEOs

Amid increasing costs of global data breaches, CEOs are still practicing poor password hygiene by using "123456" and "password."

May 25, 2022 TD Staff Leave a Comment

The tech industry is one of the most breached sectors, according to the latest study by NordPass. The findings suggest high-level executives worldwide are still practicing poor password hygiene, as the most popular password remains “123456.” NordPass, in partnership with independent researchers analyzing cyber incidents, compiled a list of top passwords used by top-level executives. […]

Read More

Google Cybersecurity Certificate

10 Common Cybersecurity Mistakes Your Organization is Making

The 10 most common ways attackers gain initial access are not all that hard to secure, according to new CISA advisory.

May 23, 2022 Zachary Comeau Leave a Comment

With more of the world relying on technology to connect and maintain business continuity over the last two years, malicious cyber actors have stepped up their game to exploit weaknesses in organizations’ IT infrastructure and conduct a broad range of attacks against both public and private entities. However, network defenders and IT professionals can stop […]

Read More

CISA Software Security

Is Your IT Department Augmented by an MSP? Take These Cybersecurity Steps Now.

CISA and other agencies are urging organizations to take steps to guard themselves against possible compromise of their MSPs.

May 20, 2022 Zachary Comeau Leave a Comment

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and a host of other cybersecurity and law enforcement agencies are urging organizations to take steps to guard themselves against possible compromise of their managed service providers (MSP) as advanced threat actors and nation states are expected to up their attacks against those service providers. Attacking and […]

Read More

Metap Inc.: Metaverse Project GensoKishi Online Announces a Closed Alpha Ticket (Bronze) Lottery

May 12, 2022 TechDecisions Staff Leave a Comment

TAIPEI, Taiwan–(BUSINESS WIRE)–GensoKishi Online -Meta World- is developed under the license of the well-known Japanese 3D MMO title “Elemental Knights Online.” The iconic game has a 14 year history and has accumulated a total of 8 million downloads worldwide. It already has a 3D MMORPG game with active users, with a fully-functioning 3D metaverse, that […]

Read More

Proofpoint CISO, CISOs cyberattack

A NASA-Style Approach to Preventing Supply Chain Attacks in 2022

Enterprises involved in the global supply chain, even tangentially, have become highly susceptible to cyberattacks.

May 2, 2022 Vijay Viswanathan Leave a Comment

Enterprises involved in the global supply chain, even tangentially, have become highly susceptible to cyberattacks. This is because infiltrating a third-party software provider gives bad actors an avenue to target and access thousands of downstream customers. One of the biggest recent supply chain attacks was on IT management software provider SolarWinds, which saw hackers insert […]

Read More

Hybrid Work security

The Great Resignation and Hybrid Work are Changing the Security Landscape

Supporting a remote/hybrid work environment complicates IT environments— Here are a few tips for employers to remain hypervigilant in their security practices.

April 29, 2022 Jimmy Chang Leave a Comment

Record numbers of Americans are quitting their jobs in what many are now calling the “Great Resignation.” Remaining employees who have had an opportunity to prove their value and ability to work productively from anywhere are placing intense pressure on their employers to support a remote/hybrid work environment. Gartner recently stated that “51% of global knowledge workers will be […]

Read More

Active Directory Misconfigurations

Common Active Directory Misconfigurations That Could Lead to Compromise

Cybersecurity firm Mandiant lays out the 12 most common Active Directory misconfigurations it has seen during 2021.

April 22, 2022 Zachary Comeau Leave a Comment

Cybersecurity services provider Mandiant has released its M-Trends 2022 report, based on data from the company’s investigations between October 2020 and the end of 2021, and it shows that while cyber defenses and techniques are improving, attackers are also continuing to adapt to new trends. Based on the company’s investigations, the report also outlines some […]

Read More

Nordlocker for Business

NordLocker Launches Encrypted Cloud Storage for Business

NordLocker's new cloud storage tool for business admins ensures an end-to-end security solution for corporate data.

April 20, 2022 TD Staff Leave a Comment

NordLocker, the encrypted cloud storage service provider has launched a business product to offer organizations around the world protection of their corporate data. Nord Security, parent company of NordLocker, introduced NordLocker’s file encryption tool in 2019. Since then, it has undergone many development phases and  is “…now positioned as an end-to-end encrypted cloud storage option […]

Read More

Trellix Report Gauges Cyber Readiness of Indian, Australian and Japanese Government Agencies and Critical Infrastructure Providers

April 14, 2022 TechDecisions Staff Leave a Comment

Survey Respondents Identify Software Supply Chain and Cybersecurity Skills Shortages as Key Challenges; Cyber Defense Coordination and Threat Data Sharing Identified as Areas of Opportunity for More Government Leadership  News Highlights New Trellix report finds 89 percent of respondents from India, Japan and Australia believe government-led initiatives can play a critical role in enhancing nations’ […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Interim pages omitted …
  • Page 12
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.