• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: password

NSA Programming Languages

How To Protect Your Organization from Cyberattacks Before The Holidays

IT and security pros should take extra steps to protect their organization from cyberattacks this holiday season, White House, CISA urge.

December 19, 2022 Zachary Comeau Leave a Comment

Editor’s note: This article was originally published last year, but the main points are still relevant today as we head into another holiday break. Review these tips and recommendations to keep your organization safe and secure this year.  With the holidays approaching, federal officials are again warning organizations of all sizes to be on the […]

Read More

Microsoft Authenticator FIPS iOS

Microsoft Brings FIPS 140 Compliance to Authenticator on iOS

Microsoft is bringing FIPS 140 compliance for Microsoft Authenticator on iOS devices for organizations with security and compliance concerns.

December 14, 2022 Zachary Comeau Leave a Comment

Microsoft says it is bringing FIPS 140 compliance for Microsoft Authenticator on iOS devices for organizations with security and compliance concerns. In a Tech Community blog, the Redmond, Wash.-based IT giant says many of its customers that work in environments with security and compliance requirements need authenticators to use cryptography validated by the Federal Information […]

Read More

Microsoft Apple macOS bug

Apple Introduces Wider Data Protections, Encryption, Security Keys

Apple's three new advanced security features are designed to protect against threats to user data in the cloud.

December 7, 2022 Zachary Comeau Leave a Comment

Apple has announced three new security features designed to protect user data and protect against threats in the cloud, including wider data protections, the ability to verify the identity of contacts and support for third-party security keys. According to the company, the three new features join a suite of other security tools to make Apple […]

Read More

Malware file types, HP Wolf security

HP: Archive File Format Use Among Hackers on the Rise

Archive files such as ZIP and RAR files are the file type of choice for malware delivery, according to a new report from HP Wolf Security.

December 5, 2022 Zachary Comeau Leave a Comment

Office files are no longer the most common file type for delivering malware, as archive file formats such as ZIP and RAR files are the file type of choice for threat actors to deliver malware, according to a new report from HP Wolf Security. The findings come from a quarterly report from HP’s endpoint security […]

Read More

Adobe Acrobat Microsoft Teams

Adobe, Microsoft Launch New Acrobat Integration in Teams

New Adobe Acrobat, Microsoft Teams integration is designed to help remove the friction of switching between apps and increase efficiency.

December 5, 2022 Zachary Comeau Leave a Comment

Microsoft is releasing a new integration of Adobe Acrobat into Microsoft Teams to help streamline the PDF experience in the company’s collaboration app. According to Microsoft, the new experience helps remove the friction of switching between apps for organizations that work with PDFs in Adobe Acrobat and can result in better efficiency, security and cost […]

Read More

IT news, This Week in it, Microsoft, Google, Gmail, ISE 2023,

This Week in IT: AWS re:Invent, Cuba Ransomware, LastPass Incident

AWS innovations, a new advisory on the Cuba ransomware group and another security incident at LastPass highlight this week's IT news.

December 1, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you This Week in IT, a curated summary of IT and enterprise technology news stories each week. AWS re:Invent Announcements Amazon Web Services […]

Read More

NETSCOUT UC&C, videoconferencing, meeting room, conference room

How to Optimize Conferencing Spaces for Hybrid Meetings

Optimizing conferencing spaces to accommodate hybrid work models and meetings starts with thoughtful conference room design.

November 30, 2022 Mike Walsh Leave a Comment

It’s no secret that the hybrid workforce is here to stay. A recent Gallup study found that hybrid work has increased from 32% in 2019 to 42% in February 2022, and is anticipated to rise to 53% in 2022 and beyond. This means that businesses must adjust day-to-day operations, including meetings, to accommodate about half […]

Read More

AWS S3

AWS Identity and Access Management Supports Multiple MFA Devices

AWS is making it possible to add multiple MFA devices to AWS Account root users and AWS Identity and Access Management users.

November 17, 2022 Zachary Comeau Leave a Comment

Amazon Web Services (AWS) is making it possible to add multiple multi-factor authentication devices to AWS Account root users and AWS Identity and Access Management (IAM) users in their AWS accounts in a move to help limit access management to highly privileged principals. Previously, organizations could only have one MFA device associated with root users […]

Read More

Twitter phishing, security, cybersecurity

Beware of Twitter Phishing Scams As Musk Takeover Unfolds

Cybersecurity experts are warning of significant security risks stemming from organizational changes at Twitter.

November 16, 2022 Zachary Comeau Leave a Comment

With Twitter constantly in the news due to large-scale shifts in the social media company’s strategy after the takeover of Elon Musk, cybersecurity professionals are warning of new phishing scams and security risks as the new story continues to play out. Billionaire and CEO of Tesla and SpaceX Elon Musk finalized his $44 billion acquisition […]

Read More

MIcrosoft Entra External ID

Microsoft Sounds the Alarm on Nation-state Attacks, Cybercriminals and IoT Threats

Microsoft's Digital Defense Report suggests cybersecurity will remain a critical IT investment as bad actors continue to shift strategies.

November 7, 2022 Zachary Comeau Leave a Comment

Nation-state cyberattacks targeting critical infrastructure are rising as countries continue to leverage technology to carry out advanced cyberattacks in addition to physical warfare, according to Microsoft’s latest Digital Defense Report. Much of the report focuses on the ongoing Russian war against Ukraine—which Microsoft attributes as a main cause of a spike in cyberattacks targeting critical […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Interim pages omitted …
  • Page 53
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.