• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: phishing

McAfee ransomware attack

Why Work with Vendors That Don’t Exhibit Cybersecurity Awareness?

If you're truly protective of your network, it's best to avoid working with vendors that don't exhibit cybersecurity awareness and don’t demonstrate cybersecurity measures in their digital interactions.

November 7, 2018 Tom LeBlanc Leave a Comment

The gateway for that cyber crime was through an HVAC contractor that worked with the retailer, Simopoulos pointed out.

Read More

Expel MDR for Kubernetes, cloud

How Can SMBs Get the Cybersecurity of Enterprise Organizations?

As an SMB you don’t have the cybersecurity team of a large enterprise organization, but there are ways for you to improve cybersecurity practices nonetheless.

October 15, 2018 Jonathan Blackwood Leave a Comment

As an SMB you don’t have the cybersecurity team of a large enterprise organization, but there are ways for you to improve cybersecurity practices nonetheless.

Read More

Proofpoint CISO, CISOs cyberattack

Cybersecurity Awareness Month: 8 Ways to ‘Celebrate’ with Your Employees

Some of these cybersecurity tips are easy to implement during Cybersecurity Awareness Month. The others are good conversation-starters.

October 11, 2018 Tom LeBlanc Leave a Comment

As Internet of Things (IoT) catches steam both at home and in workplaces, BGU offers the following cyber security tips for Cybersecurity Awareness Month

Read More

A Story of Human Error, Access Control, Technology and the Gym

When it comes to physical security you can never be too safe – which means ensuring that human error is as scrutinized as the technology itself.

September 20, 2018 Jonathan Blackwood Leave a Comment

When it comes to physical security you can never be too safe – which means ensuring that human error is as scrutinized as the technology itself.

Read More

Featured Video Play Icon

My TechDecisions Week in Review: Cybersecurity, Mass Notification, Space Force, Etc.

This week, September 3rd-7th, 2018: cybersecurity tips, a podcast with a cybersecurity expert, the need for a Cyber Force, and more.

September 7, 2018 TechDecisions Staff Leave a Comment

This week, September 3rd-7th, 2018: cybersecurity tips, a podcast with a cybersecurity expert, the need for a Cyber Force, and more.

Read More

iOS macOS vulnerabilities

Overcoming the Cybersecurity Dangers of BYOD

In today’s high tech world, nearly everyone you meet owns a smartphone, tablet or laptop computer. And in the era of BYOD, any and all of these devices are being used for work.

September 6, 2018 Kim Del Fierro Leave a Comment

In today’s high tech world, nearly everyone you meet owns a smartphone, tablet or laptop computer. And in the era of BYOD, any and all of these devices are being used for work.

Read More

A Glossary of IT Terms an MSP Will Say

When you’re working with an MSP, VAR, or any IT service provider, you’ll want to understand some of their language. Here is a glossary of common terms explained.

August 20, 2018 Christopher Barber Leave a Comment

When you’re working with an MSP, VAR, or any IT service provider, you’ll want to understand some of their language. Here is a glossary of common terms explained.

Read More

Open-Source Facial Recognition Program Tracks Users Across Social Media

A new open-source program for facial recognition allows programmers to identify profiles on social media networks based on names and pictures.

August 15, 2018 Jonathan Blackwood Leave a Comment

A new open-source program for facial recognition allows programmers to identify profiles on social media networks based on names and pictures.

Read More

Russian Hackers Reach U.S. Utilities –Here’s What Decision Makers Need to Know

Here’s how Russian hackers got into the U.S.’s utilities, and what that means for American companies.

August 9, 2018 Jessica Messier Leave a Comment

Here’s how Russian hackers got into the U.S.’s utilities, and what that means for American companies.

Read More

Google-Cloud-e1528131941758-1

Google Launches Shielded VMs Technology to Heighten Efforts Against Cloud Attackers

Though Google’s cloud already has top-notch security, Google is trying to make their virtual machines bulletproof.

August 8, 2018 Sam Harton Leave a Comment

Though Google’s cloud already has top-notch security, Google is trying to make their virtual machines bulletproof.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 31
  • Page 32
  • Page 33
  • Page 34
  • Page 35
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.