• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: ransomware

3CX Hack Supply Chain attack compromise

These are the Top 11 Malware Strains Observed in 2021

These are the top malware strains that IT and security professionals should protect against, according to U.S., Australian cybersecurity officials.

August 5, 2022 Zachary Comeau Leave a Comment

A new joint cybersecurity advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) details the 11 most-observed malware strains from the last year, including remote access Trojans, banking Trojans, information stealers and ransomware. In the advisory, CISA along with the ACSC says most of these top malware […]

Read More

Microsoft 365 domain, cloud.microsoft

With Microsoft Office Macros Blocked by Default, Hackers are Using Other Techniques

New Proofpoint research show how threat actors are adapting to Microsoft blocking Office macros by default by leveraging other file types.

July 29, 2022 Zachary Comeau Leave a Comment

After pausing the rollout of a default macro-blocking feature in Microsoft Office, Microsoft is now officially blocking VBA macros by default in Office applications in a move to make it harder for threat actors to deploy malware and ransomware using Office applications. Microsoft first announced the VBA macro blocking in February 2022, just a few […]

Read More

Palo Alto Networks Prisma SASE Accenture

ProxyShell, Log4Shell Among Most Exploited Security Bugs

New cybersecurity trends report from Palo Alto Networks finds that attackers are quickly exploiting new vulnerabilities.

July 27, 2022 Zachary Comeau Leave a Comment

Updating systems and patching security vulnerabilities has always been a key part of the job for any IT or security professional, but a new report from cybersecurity giant Palo Alto Networks sheds new light on just how quickly threat actors are leveraging new vulnerabilities. The Santa Clara, Calif.-based security software provider’s Unit 42 Incident Response […]

Read More

spam filtering

Spam Filtering 101: An Important Part of a Nutritious Breakfast

Careful planning is the most important part of any effective anti-spam deployment. Here's some key tips to maximize your chances of success.

July 25, 2022 Link Porterfield Leave a Comment

The first spam email was sent 44 years ago, and the threat posed by this sinister practice has grown to reach a scale that few, if any, could have envisioned back in the late 1970s. The spam problem goes far beyond annoying solicitations for questionable products and unwanted adverts from presumably well-meaning, but misguided and […]

Read More

SolarWinds IT Pro Day

This Week in IT: Cloud Partnership, Apple Security Updates, Outages, LAPSUS$

A Microsoft and Oracle partnership, Apple security fixes, services outages and cybersecurity headline this week's IT news.

July 21, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you this curated summary of IT and enterprise technology stories each week. Microsoft, Oracle announce general availability of Database Service for Microsoft […]

Read More

IT Leaders, IT Careers, IT jobs

Why IT and Business Leaders Need to Solve Their Disconnect

Proposed SEC rules require organizations to report cybersecurity data, so companies need to solve the disconnect between IT and leadership.

July 20, 2022 Zachary Comeau Leave a Comment

In March, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules that are designed to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance and incident reporting by publicly traded companies. However, a historic disconnect between IT and business leaders could make them difficult to implement. If adopted, the rules would […]

Read More

Xarios, Real-Time Call Analytics, Audian, internal tools

Study: Tech Teams Spend a Third of Their Time Building Internal Tools

Retool's 2022 State of Internal Tools Report reveals engineers are spending a third of their time building and maintaining internal tools.

July 20, 2022 TD Staff Leave a Comment

Technical teams are spending a lot of time on internal tools; in fact, an average of 33% of their time, according to latest research from Retool, who surveyed 2,000+ people who have built internal tools to learn more about how they build and maintain these tools, as well as how the process has changed over […]

Read More

Professional ChromeOS Administrator certification

Google’s Chrome OS Flex Is Now Available To Repurpose Old PCs and Macs

Chrome OS Flex, Google's cloud-first operating system designed to repurpose older PCs and Macs and reduce waste, is now available.

July 18, 2022 Zachary Comeau Leave a Comment

Google is officially releasing Chrome OS Flex, its cloud-first operating system designed for PC and Macs that allows organizations to repurpose older machines with Google’s cloud-based operating system. The company first introduced Chrome OS Flex in February in early access channels, saying the offering is essentially a new version of CloudReady, an operating system built […]

Read More

IT news, This Week in IT

This Week in IT: macOS Bug, New Google Cloud Offerings, Phishing Attacks, Autopatch, and More

Security research, threat trends and the general availability of Microsoft's AutoPatch highlight this week's IT news.

July 14, 2022 Zachary Comeau Leave a Comment

Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you this curated summary of IT and enterprise technology stories each week. Microsoft Discovers macOS App Sandbox escape bug Microsoft says it […]

Read More

Syxsense, Cybersecurity, IT management

How Combined IT Management and Security Solutions Can Help Detect and Fix Vulnerabilities

Cybersecurity company Syxsense says its combined IT management and security platform can help IT teams be more efficient.

July 13, 2022 Zachary Comeau Leave a Comment

My TechDecisions was at RSA Conference 2022 last month, and we learned that the cybersecurity market is becoming crowded with solution providers and tools that can do many different things, including vulnerability scanning, endpoint management, patching and other critical security functions. That typically means organizations must use several different solutions to do very specific tasks […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 18
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Interim pages omitted …
  • Page 56
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.