• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: phishing

Cybersecurity Board

Cyber Literacy Test: 7 Questions to Ask Your Board to Reduce Risk and Educate Leaders in the Age of Attacks

Every board of directors is tasked with the responsibility of protecting their corporation’s complete cybersecurity risk profile.

July 7, 2022 Naveen Bhateja Leave a Comment

As corporations consider their cybersecurity weaknesses, the focus often falls on unsecured networks, outdated systems, or a lack of monitoring designed to detect attacks. One area that is rarely identified, but that can significantly threaten a corporation’s ability to prevent, manage, and respond to cyber attacks, is the cyber literacy of the corporation’s board. Every […]

Read More

New Toolkit and Course From ISACA Help Practitioners Develop Risk Scenarios

July 5, 2022 TechDecisions Staff Leave a Comment

Risk Scenarios Starter Pack is free for ISACA members SCHAUMBURG, Ill.–(BUSINESS WIRE)–#isaca–One of the challenges for IT risk management is to identify important and relevant risk, and one of the best ways to do that is through a well-developed risk scenario providing a realistic and practical view of risk that may prevent an enterprise from […]

Read More

MIcrosoft Entra External ID

Prepare: Microsoft Begins Disabling Basic Auth in Exchange Online Oct. 1

Microsoft and CISA are releasing more details and guides to help organizations move from legacy authentication methods in Exchange Online.

June 30, 2022 Zachary Comeau Leave a Comment

Microsoft and U.S. cybersecurity officials renewing calls for organizations to switch from Basic Authentication (Basic Auth) in Microsoft Exchange Online to Modern Authentication before the company begins to disable Basic Auth in October. Microsoft on Oct. 1 will begin turning off the ability to use Basic Auth in Exchange Online for Exchange ActiveSync (EAS), POP, […]

Read More

Global Survey of 1,400+ IT Leaders Finds That Elastic Helps Organizations Increase Profitability and Growth

June 23, 2022 TechDecisions Staff Leave a Comment

Company’s First Results That Matter Customer Value Study Reveals Key Business Value Drivers  Driving profitability while reducing costs 68% through tool consolidation Simplifying solution management in the cloud and reducing data center overhead costs by 71% Improving customer and employee satisfaction by 69% Increasing application and service resilience through a 66% improvement in mean time […]

Read More

3CX Hack Supply Chain attack compromise

IT Security Experts Should Pay Close Attention To What’s Happening in Ukraine

The conflict between Russian and Ukraine and the advanced cyberattacks being launched should concern everyone, experts say.

June 22, 2022 Zachary Comeau Leave a Comment

If the last few years are any indication, cybercriminals will continue adopting new tactics and techniques to find ways past our network defenses, and that was on display in full force at RSA Conference earlier this month, where cybersecurity experts shared what they’re seeing in the wild. The annual cybersecurity conference was held at a […]

Read More

Microsoft Fortra healthcare ransomware

Tenable: Ransomware-as-a-Service is Booming

A new report from Tenable details the lucrative ransomware industry and how cybercrime has matured into a business-like ecosystem.

June 22, 2022 Zachary Comeau Leave a Comment

The subscription economy adopted by the software industry is growing ransomware from what was once a fledgling threat to an IT security crisis as ransomware groups continue to pad their wallets and grow the ransomware-as-a-service economy, according to a new report from Tenable. According to the Maryland-based vulnerability management software company, that service model is […]

Read More

Cloudflare Expands Its Zero Trust Platform to Become the Only Cloud-Native Provider with Network Scale

June 20, 2022 TechDecisions Staff Leave a Comment

Continued innovation to secure all aspects of a company’s applications, devices, and networks drove 100% year over year customer growth and 6X growth in daily traffic SAN FRANCISCO–(BUSINESS WIRE)–Cloudflare, Inc. (NYSE: NET), the security, performance, and reliability company helping to build a better Internet, today announced several new capabilities for Cloudflare One, its Zero Trust […]

Read More

employee phishing email cybersecurity warning hacker network

How Employees Can Invite Hackers into Your Network

Employees are mistakenly sending open invitations for hackers to infiltrate company networks in a myriad of ways.

June 13, 2022 Richelle Calicott Leave a Comment

The new working environment has challenges for organizations and employees. According to Gartner, the worldwide information security market is predicted to hit $170.4 billion in 2022. This happens as companies invest heavily into cybersecurity, one of the fastest-rising concerns in the modern workspace. However, smart companies know that most savings will come from employee sensitization. […]

Read More

Zero Trust, Leostream, AWS

BlackBerry Launches Zero Trust Network Access Solution with CylanceGATEWAY

Blackberry, CylanceGATEWAY unveiled a new ZTNA solution designed to defend against evolving threat landscapes.

June 10, 2022 TD Staff Leave a Comment

Security software and services provider BlackBerry Limited unveiled a new zero trust network access (ZTNA) as-service with CylanceGATEWAY. The new service is designed to securely enable remote workers and prevent malicious threat actors from compromising corporate networks using advanced AI-driven cybersecurity. Available to customers globally from July 2022, CylanceGATEWAY will provide businesses of all sizes […]

Read More

healthcare ransom payment cybersecurity

Foundational Tips for Fighting Healthcare’s Top Cyberthreats

With ransomware attacks in the healthcare sector on the rise, here are some basic tips for creating a stronger cybersecurity posture.

June 9, 2022 Tom Neclerio Leave a Comment

In 2021 alone, the healthcare industry saw a 123% increase in ransomware attacks and sensitive data breaches likely as a result of the pandemic. It is of no surprise that cyberattacks have only continued to escalate and intensify across healthcare institutions – further destabilizing the medical field, adding to concerns among patients, and creating more […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.