• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: password

LastPass HP

LastPass Free On New HP Convertible Laptop

LogMeIn's password management solution LastPass will come preinstalled on HP's new Spectre x360 13 convertible laptop to select customers.

November 18, 2019 Zachary Comeau Leave a Comment

Software and cloud-based remote connectivity firm LogMeIn announced last week that HP will offer access to its password management solution, LastPass, to select customers who purchase the device manufacturer’s new Spectre x360 13 convertible laptop. HP customers using the company’s newest tablet-laptop combination can access a free LastPass account via a Windows Start Tile. According […]

Read More

cyber security checklist

The Cyber Security Checklist: Make Sure Employees Follow These 4 Cyber Security Best Practices

Show this cyber security checklist of best practices to your employees: it is the bare minimum of what they need to do to keep your company or org safe!

November 14, 2019 Susan Alexandra Leave a Comment

Cyber security is a major concern for all businesses and organizations. Despite having secured infrastructure, tools, and teams; companies and organizations can face a great loss with the small mistake of its employees. Employees are the working body of any organization and must be well aware of cyber security threats. Whether you are working in […]

Read More

iPhone security, Giuliani iPhone

Giuliani iPhone: The IT Manager’s Nightmare

President Donald Trump's personal attorney and cybersecurity expert reportedly needed help at an Apple Store to unlock his iPhone.

November 5, 2019 Zachary Comeau Leave a Comment

Passwords. Let’s talk about ‘em. I’ve forgotten some. You have too. No big deal. Just click the forgotten password link and follow the steps. Hopefully you remembered which email address you used to set up the account. But the code to unlock your phone? You can probably do that in your sleep. Chances are it’s […]

Read More

Titan USB-C

Google Releases USB-C Security Key

Google's new USB-C Titan Security Key offers secure two-factor account authentication, is compatible with Android, Chrome OS, macOS and Windows devices.

October 28, 2019 Zachary Comeau Leave a Comment

Google has released an additional option for devices across several platforms that will help boost security and fight phishing attacks. The technology giant partnered with hardware authentication device manufacturer Yubico —it’s longtime partner — on the USB-C Titan Security Key., a new two-factor authentication tool. According to a Google blog post, the USB-C Titan Security […]

Read More

2020 Global IoT/ICS Risk Report, control system vulnerabilities

‘Alarming’ Prevalence of IoT and Industrial Control System Vulnerabilities in Real-World Network Study

Control system vulnerabilities study explains why orgs are susceptible to downtime, safety incidents & theft of intellectual property.

October 25, 2019 TechDecisions Staff Leave a Comment

IoT and industrial control system vulnerabilities are “alarming” in their rampant state, says a report by CyberX called “2020 Global IoT/ICS Risk Report.” The data illustrates that IoT/ICS networks and unmanaged devices are soft targets for adversaries, increasing the risk of costly downtime, catastrophic safety and environmental incidents, and theft of sensitive intellectual property, the […]

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? October 21 Edition

What types of cyberattacks were carried out this week, October 21, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

October 21, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, October 21, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

Proofpoint CISO, CISOs cyberattack

Decision Makers are More Worried Than Ever About Cyber Attacks

Based on the 2019 Travelers Risk Index, businesses of all sizes are worried about being struck by a cyber attack. Many are taking steps to protect themselves.

October 16, 2019 Jessica Messier Leave a Comment

Based on the 2019 Travelers Risk Index, businesses of all sizes are worried about being struck by a cyber attack. Many are taking steps to protect themselves.

Read More

Yahoo Data Breach

Yahoo is The Latest Company to Offer Cash Settlement for Data Breach

Yahoo's data breach settlement offers a cash payment, but previous cases tell us that's wishful thinking.

October 15, 2019 Zachary Comeau Leave a Comment

No, that email from Yahoo isn’t fake, and yes, the web services provider could owe you $358 or more as part of a class action settlement. According to the company, hackers obtained Yahoo account user information between 2012 and 2016, including names, email addresses, telephone numbers, birth dates, passwords, and security questions and answers of […]

Read More

iot security dangers, IoT dangers, IoT device security

Security Risks & Potential Dangers of IoT

IoT device security is a very, VERY complicated topic. Here are some common IoT dangers and how to avoid your network being compromised.

October 8, 2019 Joe Zulick Leave a Comment

The “Internet of Things,” often referred to in its abbreviated form “IoT,” is the result of the inevitable revolution of networking commonly used essential items and appliances such as refrigerators, light switches, cameras, sensors, and other forms of hardware. Even my toothbrush has network functionality via Bluetooth. The term “IoT device” typically references a class […]

Read More

remote connectivity hacking

Tips for Avoiding Remote Connectivity Hacking

Remote connectivity hacking can be trickier to spot as scams are becoming more advanced. Here's how to address them at your organization.

October 3, 2019 Finn Faldi Leave a Comment

For the better part of the past decade, online tech support scams have been on the rise as hackers find new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true remote connectivity hacking scam today relies on sophisticated social engineering fueled with detailed information on the […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 34
  • Page 35
  • Page 36
  • Page 37
  • Page 38
  • Interim pages omitted …
  • Page 53
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.