• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: phishing

most important cybersecurity training tips

Stay Protected: 5 of the Most Important Cybersecurity Training Tips For Your Employees

We highlight the most critical cybersecurity training tips for employees because every business, whether big or small, experiences cyber threats.

August 6, 2019 David Share Leave a Comment

It is believed that the most sophisticated cyber attacks are the biggest threats to any organization. However, the biggest cybersecurity threat to a business is the people that work there. In fact, eight out of ten top data theft are as a result of human error. This means you could probably stand to receive a […]

Read More

Hacking

The Biggest Targets of Cyber Attacks and How to Prepare For Them

Christopher Krebs discusses recent phishing incidents, who is affected, and what can be done to prevent cyberattacks in the future.

July 17, 2019 Jessica Messier Leave a Comment

Christopher Krebs discusses recent phishing incidents, who is affected, and what can be done to prevent cyberattacks in the future.

Read More

Sophos Cybersecurity Trends

Warren Wants To Combat Insecure and Inefficient Elections

With a tax on the extremely wealthy, Warren wants to fund a complete overhaul of outdated American election infrastructure.

July 16, 2019 Sam Harton Leave a Comment

With a tax on the extremely wealthy, Warren wants to fund a complete overhaul of outdated American election infrastructure.

Read More

smb cloud security, SMBs, smb security risks

IoT Growth is Great, But It’s Causing SMB Security Risks

SMB security risks are more numerous in this age of IoT expansion. Here are the most prominent challenges to security caused by new developments in tech.

June 26, 2019 Terry Hearn Leave a Comment

As small businesses continue to battle traditional issues of time and resources, the rapid growth of the Internet of Things (IoT) is adding SMB security risks for teams to manage. While there are certainly many benefits to implementing IoT in terms of efficiency and logistics, such a rapid growth in the number of endpoints connected to […]

Read More

Defendify cybersecurity platform

Why Investors Put Over a Million into the Defendify Cybersecurity Platform

The Defendify cybersecurity platform just received major backing from investors. Here's what separates it from other solutions on the market.

June 20, 2019 Adam Forziati Leave a Comment

Over half of small businesses in the U.S. said they’ve experienced some kind of cyberattack within the past 12 months, says a Hiscox Cyber Readiness Report. Yet many lack a way to alert, diagnose, and solve these security concerns in a holistic way — and for a reasonable price. Recent funding gained by Defendify, a SaaS-delivered […]

Read More

biggest data breaches, data breaches list, data breaches and hacks

The 5 Biggest Data Breaches in 2019 So Far (And How They Could Have Been Prevented)

These are the biggest data breaches and hacks so far in 2019 – how could they have been stopped? We dig deeper to find out.

June 20, 2019 Adam Forziati Leave a Comment

IBM says in a study that the cost of lost business after a breach for US organizations is $4.2 million. It is evident, then, that the organizations involved in the 5 biggest data breaches in 2019 thus far will likely suffer a considerable economic blow.   But if you read this data breaches list thinking, “these are mega-companies; the risk of a data […]

Read More

Sophos Cybersecurity Trends

3 Ways to Prevent Data Breaches

Some alarming statistics on the prevalance of data breaches -- and some sound strategies on how to prevent them at your organization.

May 21, 2019 Dan Kiehl Leave a Comment

It seems like every day in the news you read about another data breach. According to a study published by IBM, an organization has a 27% chance of suffering a breach of at least 1,000 records. There have been so many data breaches  in the past several years that now it seems commonplace. “According to […]

Read More

Warren the Lone Presidential Candidate Using Basic Email Security

Most of the 2020 presidential hopefuls—including the sitting president—are not properly securing their email addresses.

May 21, 2019 Sam Harton Leave a Comment

Most of the 2020 presidential hopefuls—including the sitting president—are not properly securing their email addresses.

Read More

USB killers

Are Your Classrooms Safe from ‘USB Killers’?

These 'USB Killers' destroyed 66 computers last month during just one incident -- and there've been many. What does this mean for school tech security?

May 16, 2019 Paul Konikowski Leave a Comment

A former student of the College of St. Rose in New York pled guilty to destroying “66 computers as well as numerous monitors and digital podiums containing USB data ports owned by the College.” The damage was done using a “USB Killer” device that discharged high voltage pulses into the host device, damaging the host’s electrical […]

Read More

U.S. Cybersecurity Strategy

9 Cyber Security Training Videos That Aren’t Boring

As IT directors try to mitigate human errors that create IT security risks, one tactic is showing cyber security training videos that will hold employees’ attention.

May 12, 2019 Tom LeBlanc Leave a Comment

There is a reason why many IT directors turn to funny (or at least interesting) cyber security training videos to educate employees about IT security risks. Ask any CIO, IT director or IT professional what keeps them up at night and they’re likely to acknowledge cyber security risks at their organization. The reason they lose […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 29
  • Page 30
  • Page 31
  • Page 32
  • Page 33
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.