• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: password

Microsoft Hospitals

Data Breach Incident Response Plan: 6 Essential Steps

If you're charged with influencing your organization's data breach incident response plan, make sure you include these essential steps.

December 20, 2018 TD Staff Leave a Comment

Your organization most definitely has physical security breach plans in place, but do you also have a data breach incident response plan? 

Read More

digital security

IT Must Close the Gap Between Digital Security and Customer Experience

One in four IT professionals identifies a gap when trying to balance customer experience and digital security says an Equifax survey.

December 13, 2018 Lisa Montgomery Leave a Comment

One in four IT professionals identifies a gap when trying to balance customer experience and digital security says an Equifax survey.

Read More

Expel MDR for Kubernetes, cloud

AWS Spot Instance and Cloud Security

All cloud providers have some type of a compute product offering which lets the user bid for the resource they need to complete or for more tasks. Amazon web services has led the way, offering a low cost EC2 usage option called Spot Instance. The model is unusual in the sense that tests the true limits of fault tolerance and unexpected interruptions in a software.

December 6, 2018 Rakesh Sachdeva Leave a Comment

All cloud providers have some type of a compute product offering which lets the user bid for the resource they need to complete or for more tasks. Amazon web services has led the way, offering a low cost EC2 usage option called Spot Instance. The model is unusual in the sense that tests the true limits of fault tolerance and unexpected interruptions in a software.

Read More

Fake Fingerprints Show Vulnerabilities in Security Measures

A group of researchers at NYU developed artificial fingerprints that were able to closely match real ones, demonstrating a possible weakness in fingerprint security methods.

December 5, 2018 Sam Harton Leave a Comment

A group of researchers at NYU developed artificial fingerprints that were able to closely match real ones, demonstrating a possible weakness in fingerprint security methods.

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? November 30 Edition

What types of cyberattacks were carried out this week, November 30, 2018? Read on to find out about the latest cyberattacks and who got hacked this week.

November 30, 2018 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, November 30, 2018? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

printers

Better Document Security Provided by New A4 Line of Ricoh Printers

Five new multifunctional, cloud-connected printers from Ricoh boast enhanced document security features.

November 21, 2018 Lisa Montgomery Leave a Comment

Five new multifunctional, cloud-connected printers from Ricoh boast enhanced document security features.

Read More

Passcodes Are Protected By the Law – Sort Of

Citing a case from Florida, Naked Security delves into the Fifth Amendment, and how legal cases involving passcodes are affected.

November 20, 2018 Jessica Messier Leave a Comment

Citing a case from Florida, Naked Security delves into the Fifth Amendment, and how legal cases involving passcodes are affected.

Read More

Mid-Term Elections Happened Last Week, and We’ve Already Been Hacked

Progress has been made in keeping the electronic processes of U.S. elections safe, but not enough. And, the cyberattacks on the 2018 mid-term elections have already started.

November 12, 2018 Jessica Messier Leave a Comment

Progress has been made in keeping the electronic processes of U.S. elections safe, but not enough. And, the cyberattacks on the 2018 mid-term elections have already started.

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? October 19 Edition

What types of cyberattacks were carried out this week, October 19, 2018? Read on to find out about the latest cyberattacks and who got hacked this week.

October 19, 2018 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, October 19, 2018? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

cybersecurity Proofpoint compliance

What’s Your Action Plan to Battle Cybersecurity Attacks?

CompliancePoint offers suggestions on how to build a security awareness program to reduce cybersecurity issues.

October 17, 2018 Lisa Montgomery Leave a Comment

CompliancePoint offers suggestions on how to build a security awareness program to reduce cybersecurity issues.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 38
  • Page 39
  • Page 40
  • Page 41
  • Page 42
  • Interim pages omitted …
  • Page 53
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.