• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH

Search Results: remote work security

cybersecurity mesh architecture CSMA, ZTA

Building a Foundation for Zero Trust with Cybersecurity Mesh

A cybersecurity mesh architecture (CSMA) goes beyond ZTA and suggests a deeper, better integrated layer of security.

August 31, 2022 Wes Wright Leave a Comment

It seems like there are more acronyms, labels and methods for bolstering security than ever before – and making sense of them all is proving to be just as complex as the infrastructure they’re meant to secure. One widely embraced term, zero-trust architecture (ZTA), calls for continually vetting users as they access different applications and […]

Read More

router vulnerabilities security flaws

Router Security Flaws Surge to Record Heights

Router security flaws may expose individuals and corporate networks to cybersecurity dangers. Here's how to secure your home WiFI network.

August 4, 2022 TD Staff Leave a Comment

With the rise of remote work, routers are gaining more attention. Remote work opens the possibility for hackers to breach corporate security by abusing old and unpatched home routers, according to Atlas VPN. Router flaws may expose individuals and corporate networks to cybersecurity dangers such as hacking, data breaches, financial fraud, industrial espionage and others. […]

Read More

Home Office Cybersecurity security

5 Tech Security Ideas for Creating a Safe Home Office

When working from home, the heightened cybersecurity risks that come with working outside of a secure corporate network must be addressed.

August 2, 2022 Kate Jones Leave a Comment

Working from home can create a great sense of freedom and flexibility, but it comes with its challenges. When working from home, the heightened cybersecurity risks that come with working outside of a secure corporate network must be addressed for optimal protection. Should someone hack into your home office or Wi-Fi network, your computer and […]

Read More

Remote Work Productivity, tips for 2021, carbon emissions

How to Measure Employee Productivity in a Remote World

According to Statista, 57% of employees experienced increased productivity while working from home, but exactly how is it measured?

August 2, 2022 Dominik Birgelen Leave a Comment

According to Statista, 57% of employees experienced increased productivity whilst working from home, but exactly how it is measured?

Read More

Palo Alto Networks Cortex Active ASM, Google Cloud

ProxyShell, Log4Shell Among Most Exploited Security Bugs

New cybersecurity trends report from Palo Alto Networks finds that attackers are quickly exploiting new vulnerabilities.

July 27, 2022 Zachary Comeau Leave a Comment

Updating systems and patching security vulnerabilities has always been a key part of the job for any IT or security professional, but a new report from cybersecurity giant Palo Alto Networks sheds new light on just how quickly threat actors are leveraging new vulnerabilities. The Santa Clara, Calif.-based security software provider’s Unit 42 Incident Response […]

Read More

Jabra PanaCast 50, hybrid work workers

Jabra on the Opportunities and Challenges of Hybrid Work

Jabra’s Gina Spencer talks about how to ensure today’s hybrid workers have seamless and enjoyable collaboration experiences.

July 15, 2022 TD Staff Leave a Comment

Editors note: My TechDecision’s sister-site Commercial Integrator has teamed up with the IMCCA, the New York-based non-profit industry association for unified communication and workplace collaboration, to produce a quarterly supplement that focuses on all things collaboration from multiple perspectives. Together, the organizations launched Collaboration Today and Tomorrow. CI: Please tell us a little about Jabra.  Gina Spencer: Jabra […]

Read More

K-12 Cybersecurity

Small Cybersecurity Teams Face Greater Cyber Risk Than Larger Organizations

Cynet survey reveals lack of staff, skills and resources are driving smaller teams to outsource security with advanced tools.

July 14, 2022 TD Staff Leave a Comment

Small security teams face greater risk from attacks than larger enterprises, reveals findings from Cynet, the Boston-based provider of an autonomous, end-to-end, automated extended detection and response (XDR) platform, in it’s second annual CISO Survey of Small Cyber Security Teams report. Smaller security teams are moving towards consolidating security platforms to fewer, more robust and […]

Read More

Survey: Small Cybersecurity Teams Face Greater Risk from Attacks than Larger Enterprises

July 13, 2022 TechDecisions Staff Leave a Comment

Cynet CISO survey reveals lack of staff, skills, and resources driving smaller teams to outsource security with advanced tools, technologies, and services BOSTON–(BUSINESS WIRE)–Cynet, the world’s first provider of an autonomous, end-to-end, fully automated extended detection and response (XDR) platform, today announced the results of its second annual “CISO Survey of Small Cyber Security Teams.” […]

Read More

Epoch Concepts Announces Epoch Axis, a New Zero-Trust-Based Remote Access Solution for Energy Companies

July 12, 2022 TechDecisions Staff Leave a Comment

LITTLETON, Colo.–(BUSINESS WIRE)–#Data–Epoch Concepts, a leading provider of IT solutions and services to the U.S. federal government, enterprises, and systems integrators today announced the availability of Epoch Axis, a zero-trust-based remote access solution tailored for the energy sector. Epoch Axis is designed to give remote workers and third-party technicians secure and remote, high-speed access from […]

Read More

PowerShell Cybersecurity

How to Secure PowerShell and Use it for Cybersecurity Defense

Cybersecurity agencies say organizations should take several steps to secure PowerShell and keep it from being used in cyberattacks.

July 6, 2022 Zachary Comeau Leave a Comment

PowerShell is an incredibly effective tool that allows IT administrators to automate repetitive tasks and is particularly useful in helping to protect and manage the cybersecurity of Windows operating systems. However, those same capabilities are just as useful for hackers after gaining initial access to a network,  with PowerShell scripts being used to weaken intrusion […]

Read More

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Interim pages omitted …
  • Go to page 122
  • Go to Next Page »

Primary Sidebar

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.