• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: password

Net LastPass Helps Boosts Colleges’ Password Management Options

The new LastPass initiative by Internet2 Net+ helps colleges lock in and remember a master password to keep sensitive information safe.

July 22, 2015 Jessica Kennedy Leave a Comment

The new LastPass initiative by Internet2 Net+ helps colleges lock in and remember a master password to keep sensitive information safe.

Read More

Five Security Tips for Password Effectiveness

Simple guidelines for maximum data protection and privacy control.

December 4, 2011 TD Staff Leave a Comment

Simple guidelines for maximum data protection and privacy control.

Read More

Screenshot of Jabra+ for Admins.

Jabra Launches Jabra+ For Admins Software Platform

Jabra+ for Admins enables IT admins to remotely manage devices and meeting spaces, streamlining tasks with its cloud-based, API-first platform.

January 30, 2024 TD Staff Leave a Comment

Jabra, global provider of wireless sound and hybrid-work solutions, announced Jabra+ for Admins, a cloud-based API-first software platform for remote monitoring and management of meeting rooms and devices. Per a statement, Jabra+ for Admins offers a seamless experience from start to finish, allowing users to manage their communication devices with ease. As a result, it […]

Read More

DDoS, NETSCOUT Arbor Insight

7 Layers of DDoS Attacks and How To Prevent Them

DDoS attacks can derail profits; safeguard your business against them with these prevention methods across different layers.

December 28, 2023 Mia Turlington Leave a Comment

As businesses grow to gain traction and revenue from the Internet, the increasing reliance is an easy target for Distributed Denial of Service (DDoS) attacks. Like any new venture, risks are an undeniable part that comes with it. For eCommerce businesses, the main risk is DDoS attacks. Known as a dangerous and malicious attack to […]

Read More

Phishing, Email security

Email Attacks are Evading Security Protections. Here’s How Security Teams Should Respond.

IT, security teams and end users should take these actions to combat increasingly sophisticated email threats.

June 6, 2023 Trevor Collins Leave a Comment

Instances of business email compromise (BEC) – a targeted form of phishing in which attackers try to scam companies out of money or goods or trick employees into giving up sensitive info – have continued to increase, causing devastating impacts. Last year, the FBI’s Internet Crime Complaint Center (IC3) reported $43 billion of global exposed […]

Read More

MOVEit vulnerability, zero-day, Progress Software

Act Now: Vulnerability in Progress Software’s MOVEit Transfer Software

Cybersecurity researchers are sounding the alarm on a new zero-day vulnerability in Progress Software’s MOVEit Transfer solution.

June 2, 2023 Zachary Comeau Leave a Comment

Cybersecurity companies and researchers are sounding the alarm on a new zero-day vulnerability in Progress Software’s MOVEit Transfer solution, with attackers pouncing on the vulnerability since it was disclosed by Progress Software on May 31. According to Progress Software, the vulnerability in MOVEit Transfer could lead to escalated privileges and potential unauthorized access to the […]

Read More

FTC Ring

FTC Accuses Ring of Watching Private Videos, Poor Security Practices

The FTC has charged Ring with compromising its customers’ privacy and failing to implement basic privacy and cybersecurity protections.

June 1, 2023 Jason Knott Leave a Comment

The Federal Trade Commission (FTC) has charged Ring with compromising its customers’ privacy by allowing any employee or contractor to access consumers’ private videos and by failing to implement basic privacy and security protections, enabling hackers to take control of consumers’ accounts, cameras, and videos. While the FTC only mentions consumer customers, Ring does offer commercial security […]

Read More

Anderson Center Winston-Salem State University

Extron’s NAV Pro AV over IP Powers WSSU Anderson Center Meeting Spaces

A range of Extron switching, distribution, control and audio products provides full audiovisual coverage for the 400-seat auditorium.

May 23, 2023 Alyssa Borelli Leave a Comment

The Anderson Center at Winston-Salem State University (WSSU) is home to several academic departments and also serves as a busy conference venue. It boasts meeting breakout rooms, a large banquet hall and a 400-seat auditorium equipped to host professional theatrical productions. The conference venues can be booked by the campus community, government agencies, corporations, non-profit […]

Read More

Business email compromise

Business Email Compromise is on the Rise

Business email compromise attacks are increasing in sophistication, allowing attackers to quietly take over email accounts, Microsoft says.

May 22, 2023 Zachary Comeau Leave a Comment

Business email compromise has emerged as a critical threat as threat actors shift their tactics and increase the sophistication of attacks designed to takeover business emails, including leveraging residential IP addresses to hide the attacks, Microsoft says in a new Cyber Signals report. The report, the fourth such edition of Microsoft’s cybersecurity research report, finds […]

Read More

MOVEit, ransomware, CVE-2023-34362,

BianLian Ransomware Group Skips Encryption and Goes Straight to Exfiltration

The BianLian group is a ransomware actor that is targeting organizations with a data extortion model, bypassing traditional encryption.

May 17, 2023 Zachary Comeau Leave a Comment

Cybersecurity officials the, FBI, Microsoft and Sophos are warning organizations to limit their use of some legitimate tools as they are being leveraged by the BianLian group, a ransomware group that has targeted organizations with a data extortion model, bypassing the need to encrypt victims’ data. According to a joint advisory from CISA, its Australian […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Interim pages omitted …
  • Page 53
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.