• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: password manager

Microsoft Security RSA Conference

It is Now Easier To Configure, Deploy And Manage macOS Devices In Microsoft Endpoint Manager

Microsoft has released support for macOS policies in Microsoft Endpoint Manager's settings catalog, adding support for new payload settings.

February 25, 2022 Zachary Comeau Leave a Comment

IT administrators can now more easily find, configure, deploy and monitor macOS settings in Microsoft Endpoint Manager after Microsoft released support for macOS policies in its settings catalog and added support for new payload settings. Microsoft calls this part of its continued investment in macOS platform management and one that eliminates some manual processes previously […]

Read More

Keeper Security Launches Keeper Secrets Manager, the First Zero-Trust, Zero-Knowledge and Cloud-Native Solution for Securing Infrastructure Secrets

January 12, 2022 TechDecisions Staff Leave a Comment

Keeper Secrets Manager is the first and only zero-trust, zero-knowledge and cloud native secrets manager that integrates into virtually any tech stack, with no on-premise installations required CHICAGO–(BUSINESS WIRE)–Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software covering password management, dark web monitoring, digital file storage and messaging, announces the launch of Keeper […]

Read More

Password Management

More Than 90% Of IT Leaders Reuse Passwords, Survey Shows

New survey sheds light on how recent trends are impacting password management practices among IT leaders and their organizations.

December 6, 2021 Zachary Comeau Leave a Comment

Password security and good credential hygiene are some of the most important components of any organization’s cybersecurity posture, but many are still engaging in risky password practices that threaten their organization’s network security. That’s even true for IT, as 92% of IT decision makers reported reusing passwords across multiple sites—even as cyberattacks escalate due to […]

Read More

1Password Browser Extension

Stop Making Passwords Too Complex

According to cyber experts, three random words is a more secure password policy than complex passwords of letters, numbers and symbols.

August 10, 2021 Zachary Comeau Leave a Comment

If you’re still requiring users to create complex passwords with a combination of letters, numbers and symbols, think again, says the U.K.’s National Cyber Security Centre. The NCSC, the U.K. counterpart to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), maintains that complexity requirements and making users regularly change passwords is actually less secure than […]

Read More

World Password Day

Make Sure NOBODY in Your Organization Uses These Worst Passwords

You should probably send a company-wide memorandum discouraging any usage of the following worst passwords imaginable - because people DO use them.

November 23, 2020 Adam Forziati Leave a Comment

If we’ve said it once, we’ve said it a million times: USE A PASSWORD MANAGER TO HAVE DISTINCT PASSWORDS FOR EVERY APP AND WEBSITE. Yes, we just yelled that at our screens. Did you hear us? We’re taking such a harsh approach because we’re frankly tired of writing so many stories on the importance of password management. […]

Read More

Password Security

Cyber Security Tips from Pros: World Password Day Reminds Us We Need Them

On this World Password Day, we're reminded that passwords are still very exploitable. Three exec's from nCipher Security offer their recc's.

May 8, 2020 TechDecisions Staff Leave a Comment

Today is World Password Day, and it’s a great reminder that we should always strive to promote better password management. According to National Day Calendar, security researcher Mark Burnett first encouraged people to have a “password day,” where they update important passwords in his 2005 book Perfect Passwords.  Inspired by his idea, Intel Security took the […]

Read More

Identity Management Techniques,

Tech Managers Need Identity Management Techniques (For Personal AND Business Data)

MSPs tell us how important it is to lock down your and your employees' personal info with identity management techniques in order to protect business data.

December 4, 2019 Adam Forziati Leave a Comment

We at TechDecisions have spoken with many MSPs recently, and as a result, we’re feeling a bit… paranoid. I’m personally about to download a password manager since that was identified as one of the most common identity management techniques MSPs advise their clients use. Now more than ever, I’m afraid any personal data compromised might have a […]

Read More

iPhone security, Giuliani iPhone

Giuliani iPhone: The IT Manager’s Nightmare

President Donald Trump's personal attorney and cybersecurity expert reportedly needed help at an Apple Store to unlock his iPhone.

November 5, 2019 Zachary Comeau Leave a Comment

Passwords. Let’s talk about ‘em. I’ve forgotten some. You have too. No big deal. Just click the forgotten password link and follow the steps. Hopefully you remembered which email address you used to set up the account. But the code to unlock your phone? You can probably do that in your sleep. Chances are it’s […]

Read More

44 FAQs and Answers on Audinate Dante Domain Manager

Audinate provides clear answers to 44 questions about Dante Domain Manager submitted during a recent Commercial Integrator webcast.

April 11, 2018 TechDecisions Staff Leave a Comment

Audinate provides clear answers to 44 questions about Dante Domain Manager submitted during a recent Commercial Integrator webcast.

Read More

Explaining Video Surveillance Systems to the Technology Manager

Five security installers work together to explain the ins and outs of video surveillance systems, from the pieces to the installation process.

December 5, 2017 Keith Kranz, Dennis Thiele, Chad Christenson, Gary Laborg, and Robbie Danko Leave a Comment

Five security installers work together to explain the ins and outs of video surveillance systems, from the pieces to the installation process.

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Interim pages omitted …
  • Page 13
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.