• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: password manager

NSA Programming Languages

Make Cybersecurity Part Of Your Power Management Lesson Plan

IT infrastructure and cyber security considerations for protecting power devices from potential cyberattacks.

July 29, 2021 Hervé Tardy Leave a Comment

IT infrastructure and cyber security considerations for protecting power devices from potential cyberattacks.

Read More

Windows Linux Vulnerabilities

Windows, Linux Users Have New Local Privilege’s Elevation Vulns To Mitigate

IT professionals need to be aware of newly disclosed flaws in Windows and Linux systems that could give local attackers elevated privileges.

July 21, 2021 Zachary Comeau Leave a Comment

As if the list of software vulnerabilities and cybersecurity threats to mitigate isn’t long enough already, IT professionals now need to be aware of newly disclosed vulnerabilities in Windows and Linux operating systems that could give local attackers elevated privileges. Both vulnerabilities were disclosed Tuesday and come as IT professionals grapple with keeping systems up […]

Read More

Dahua USA Announces Second Generation Four-Door Access Controller

July 8, 2021 TechDecisions Staff Leave a Comment

IRVINE, Calif.–(BUSINESS WIRE)–#DahuaTechnology–Dahua Technology, a world-leading, video-centric, provider of smart IoT solutions, is introducing its newest four-door access controller to its North American market. The new model, the latest in Dahua’s family of access control devices, includes a suite of upgrades designed for small applications in need of high-performance access control. The four-door access controller […]

Read More

White House AI Regulations, ChatGPT, Generative AI

Report: Trump’s Twitter Account Easily Hacked By Dutch Security Researcher

President Donald Trump reportedly didn't have two-step authentication enabled and was using a very guessable password on his popular Twitter account.

October 22, 2020 Zachary Comeau Leave a Comment

Some of the best ways to avoid data breaches and cybersecurity compromise is to practice good password security and use other tools like two-factor authentication. That means using unique passwords that aren’t easy to guess and enabling multi-factor authentication on all of your accounts – including social media. U.S. President Donald Trump apparently didn’t get […]

Read More

Network Automation Framework
Featured Video Play Icon

Network Automation Framework: Step by Step

Here's a simplified, no-nonsense network automation framework for you to apply to your organization's planned switch to automation.

September 9, 2020 TechDecisions Staff Leave a Comment

At the virtual 2020 Enterprise Connect, Terry Slattery, a Principal Architect at advanced network consulting firm NetCraftsmen laid out a network automation framework for IT departments considering the switch. Automation is a promising thought, but also one which enterprise managers are understandably cautious about implementing. Here is a rough framework for figuring it all out for […]

Read More

Windows 10 May 2020 Update

Microsoft Releases Windows 10 May 2020 Update

New Windows 10 features include enhanced security, deployment improvements, virtualization features, Cortana updates and dozens of other improvements.

May 29, 2020 Zachary Comeau Leave a Comment

Microsoft on Wednesday began making its Windows 10 May 2020 update, version 2004, available to users after a over a month of testing with Windows Insiders. There are dozens of new features that IT professions will enjoy, including enhanced cybersecurity features, easier deployment and setups, virtualization features, new updates to virtual assistant Cortana and dozens […]

Read More

access control technology

Biometrics: The Future of Access Control

Combining physical and logical access control technology delivers a higher level of security, granting companies the ability to limit and monitor access.

May 14, 2020 Jeffrey E. Barnhart Leave a Comment

For much of history, identification systems have relied on face-to-face interactions and physical documents and processes. But digital technologies are transforming how identity is authenticated around the globe. In an era of growing security concerns, governments, corporations and property managers must elevate the importance of a trusted identity while balancing the demand for convenient and […]

Read More

Azure AWS

Secure IoT Platforms Tech Installers Recommend

Truly secure IoT platforms can be hard to identify. Here are some tips for tech decision-makers, along with installer-improved platform recommendations.

May 13, 2020 Adam Forziati Leave a Comment

Internet of Things (IoT) security is a top concern among any tech decision-maker tasked with choosing a platform to solve any need. While most tech managers believe IoT will become the new standard, there are a number of risks to consider when choosing secure IoT platforms. The most detrimental issue with many IoT devices is […]

Read More

GoToMeeting for Healthcare

LogMeIn Announces GoToMeeting for Healthcare to Support Telehealth Services

The new version of LogMeIn's GoToMeeting platform for the healthcare industry is designed to support telehealth services during the COVID-19 pandemic.

May 7, 2020 Zachary Comeau Leave a Comment

LogMeIn has released a new version of its GoToMeeting platform for the healthcare industry to help support telehealth services during the ongoing COVID-19 pandemic. The new addition to the company’s GoTo suite of unified communications and collaboration products is a videoconferencing platform preconfigured with technical, organizational and physical security measures so healthcare professionals and patients […]

Read More

Zoom Installers, Trend Micro, Zoom Installers Hack

Hackers Are Using Zoom Installers to Mine Cryptocurrency, Report Says

Hackers are taking notice of the demand for meeting platforms and are leveraging Zoom installers to spread a cryptocurrency miner, Trend Micro says.

May 4, 2020 Zachary Comeau Leave a Comment

Hackers are finding all sorts of ways to compromise our systems while we work remotely, and much of that activity is coming through applications currently in demand, like videoconferencing and collaboration platforms. Zoom has become one of the more popular platforms and hackers are taking notice — including leveraging Zoom installers to spread a cryptocurrency […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.