• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: ransomware

Is Machine Learning Cyber Security’s Most Powerful Weapon?

Machine learning software can analyze what your company does daily on the internet. This can be an invaluable tool in the fight for cyber security.

May 31, 2017 Russ Levanway Leave a Comment

Machine learning software can analyze what your company does daily on the internet. This can be an invaluable tool in the fight for cyber security.

Read More

Internet-Security-Threat-Report

New Internet Security Threat Report Dives Deep into 2016 Cyber Security

Organizations can gain great insight into the types of attacks being carried out and how to prevent them from affecting their business from the Internet Security Threat Report.

May 15, 2017 TechDecisions Staff Leave a Comment

Organizations can gain great insight into the types of attacks being carried out and how to prevent them from affecting their business from the Internet Security Threat Report.

Read More

7 Steps for Healthcare Facilities to Strengthen Cybersecurity

As cybersecurity spending around the world continues to skyrocket, healthcare institutions should be as eager as any to strengthen cybersecurity and prevent attacks.

May 15, 2017 Rozanne Andersen Leave a Comment

As cybersecurity spending around the world continues to skyrocket, healthcare institutions should be as eager as any to strengthen cybersecurity and prevent attacks.

Read More

who got hacked

Who Got Hacked This Week? May 5 Edition

What types of cyberattacks were carried out this week, May 5, 2017? Read on to find out who got hacked this week.

May 5, 2017 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, May 5, 2017? Read on to find out who got hacked this week.

Read More

Disaster Recovery Plan

The Three Parts of a Complete Backup and Disaster Recovery Plan

Creating a comprehensive backup and disaster recovery plan is better than insurance. There are three parts to a complete backup plan that you need to focus on.

March 29, 2017 Joshua Liberman Leave a Comment

What three things are the most valuable to your business? For most, it’s employees, customers and data. And how do you insure against the loss of these? Treat employees like family, customers like gold and your data like life itself. And you invest in the best data insurance plan you can, by building a complete […]

Read More

Who Got Hacked

Who Got Hacked This Week? Feb. 25 Edition

What types of cyberattack were carried out this week, February 25, 2017? Read on to find out.

February 25, 2017 Jonathan Blackwood Leave a Comment

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.   Hackers Use Malware to Spy on Israeli Military Personnel More than 100 = servicemen from the Israeli Defense Force have been targeted with spyware called ViperRAT. The malware was […]

Read More

Who Got Hacked

Who Got Hacked This Week? Feb. 4 Edition

Who and what was hacked this week, February 4, 2017? Read on to find out.

February 4, 2017 Jonathan Blackwood Leave a Comment

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.   Hotel Computer System Hacked in Austria While some reports will tell you that an Austrian hotel was held ransom, locking guests in rooms, this isn’t entirely true. The Seehotel […]

Read More

Cyber Attacks

What is the Worst Case Scenario for Cyber Attacks?

Cyberattacks can have serious implications at the individual, company, and country-wide level.

January 31, 2017 Megan Santosus Leave a Comment

Cyber attacks are top of mind today, with recent news about high profile incidents involving the Democratic National Committee and Yahoo dominating the headlines. While such incidents certainly lead to much hand wringing, cyber attacks perpetrated on individuals, companies and countries can have significant fallout that outlasts the current news cycle. At best, cyber attacks […]

Read More

Who Got Hacked

Who Got Hacked This Week? Jan. 28 Edition

Who and what was hacked this week, January 28, 2017? Read on to find out.

January 28, 2017 Jonathan Blackwood Leave a Comment

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.   Android Malware Returns to Google Play Store The Android Malware that infected over 10 million devices last year has returned. A new form of the HummingBad malware has been […]

Read More

Cyber Attack

How Does a Cyber Attack Work?

Hacking and cyber attacks are threats that should concern every company. Here's how they work.

January 17, 2017 Colleen Frye Leave a Comment

You work in the financial department of your company and you just got an email from a C-level executive. It tells you to pay an invoice of $78,000 before 1 p.m., and includes instructions for how to wire the money to your vendor’s bank. You send the money, as requested, and it quickly moves to […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 53
  • Page 54
  • Page 55
  • Page 56
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.