• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: who got hacked

My TechDecisions Week in Review: August 17, 2018

This week, August 13th-17th, 2018, we’ve got features on internal communications, project cost estimate, hybrid clouds, and more. Blogs include AI, hacking, and renewable energy. Don’t forget the Project of the Week!

August 17, 2018 TechDecisions Staff Leave a Comment

This week, August 13th-17th, 2018, we’ve got features on internal communications, project cost estimate, hybrid clouds, and more. Blogs include AI, hacking, and renewable energy. Don’t forget the Project of the Week!

Read More

who got hacked

The Most Devastating and Interesting Cyberattacks and Hacks of 2017

Each week TechDecisions rounds up the cyberattacks and hacks that occurred in that week. Here are some of the most devastating and interesting in 2017.

December 27, 2017 Jonathan Blackwood Leave a Comment

Each week TechDecisions rounds up the cyberattacks and hacks that occurred in that week. Here are some of the most devastating and interesting in 2017.

Read More

My TechDecisions Podcast- Episode 1, Sarah S. Noyes from Speak with a Geek

In the first episode of My TechDecisions Podcast, host Jonathan Blackwood speaks with Sarah S. Noyes about women and diversity in tech.

February 1, 2017 TechDecisions Staff Leave a Comment

In the inaugural episode of MyTechDecisions Podcast, host and TD Managing editor Jonathan Blackwood speaks with Sarah S. Noyes, the Director of Inclusive Diversity for Speak with a Geek. You can listen this Podcast right in your browser below, or download the .mp3 file to your computer/device to listen later. Subscribe to MyTechDecisions Podcast on […]

Read More

Cybersecurity testing, penetration testing, cyber threats

No Organization Is an Island: How to Protect Against Supply Chain Attacks

To defend against supply chain attacks, organizations need to focus on all three layers of the attack surface: data, identities and infrastructure.

March 2, 2023 Dirk Schrader Leave a Comment

Every organization interacts with other organizations: suppliers, partners, customers, government agencies and more. As a result, you can suffer a breach even though your organization was not directly targeted. For example, adversaries were able to release the infamous NotPetya malware to thousands of companies worldwide by compromising the supplier of a popular accounting software solution. […]

Read More

Cybersecurity Board

Cyber Literacy Test: 7 Questions to Ask Your Board to Reduce Risk and Educate Leaders in the Age of Attacks

Every board of directors is tasked with the responsibility of protecting their corporation’s complete cybersecurity risk profile.

July 7, 2022 Naveen Bhateja Leave a Comment

As corporations consider their cybersecurity weaknesses, the focus often falls on unsecured networks, outdated systems, or a lack of monitoring designed to detect attacks. One area that is rarely identified, but that can significantly threaten a corporation’s ability to prevent, manage, and respond to cyber attacks, is the cyber literacy of the corporation’s board. Every […]

Read More

Vulnerability Scanning

The Key Components of a Vulnerability Scanning & Management Program

Identifying security bugs and developing a robust vulnerability scanning and patching program should be a core duty of any IT team.

March 31, 2022 Zachary Comeau Leave a Comment

With thousands of new software vulnerabilities to protect against each year, it is critical that organizations develop a robust vulnerability management program that can quickly identify and remediate vulnerabilities in IT environments. Issues like Log4Shell, PrintNightmare, ProxyLogon and dozens of other critical vulnerabilities in widely used systems have kept IT departments up at night as […]

Read More

SolarWinds Hack

Why The IT Community Should Be Concerned About The SolarWinds Hack

There is still much we're learning about the SolarWinds hack, but one thing is clear: the IT security community got outplayed.

December 22, 2020 Zachary Comeau Leave a Comment

It’s being called the most devastating cyber attack on the U.S., and there’s still so much we don’t know about the SolarWinds supply chain hack, how attackers were able to compromise one of the software leaders in the IT space, what other tools could be compromised and just how much damage has been done to […]

Read More

Zoom Account Credentials

Over 500,000 Zoom Account Credentials Found on Dark Web

Cybersecurity experts say stolen Zoom account credentials were being sold for less than a penny each on the dark web to enable 'Zoombombing'.

April 14, 2020 Zachary Comeau Leave a Comment

If you use your go-to password for Zoom, you should consider changing it, according to a new report about cybersecurity researchers finding credentials for more than 500,000 Zoom accounts on the dark web. Business Insider reports cybersecurity firm Cyble discovered the accounts, many of which were being sold for less than one cent per account. […]

Read More

Managed Service Providers, MSPs, MSP horror stories

MSPs: Our Knights in Shining Armor

We asked managed service providers (MSPs) about their experiences helping customers navigate murky waters after they've been compromised.

December 3, 2019 Zachary Comeau Leave a Comment

Technology managers, IT professionals and managed service providers are often the unsung heroes of the office. They are the gatekeepers of your company’s secured networks and the knight in shining armor when that network is breached. As such, IT providers usually have some pretty good stories to tell about rescuing their clients from the dungeons of […]

Read More

U.S. Cybersecurity Strategy

9 Cyber Security Training Videos That Aren’t Boring

As IT directors try to mitigate human errors that create IT security risks, one tactic is showing cyber security training videos that will hold employees’ attention.

May 12, 2019 Tom LeBlanc Leave a Comment

There is a reason why many IT directors turn to funny (or at least interesting) cyber security training videos to educate employees about IT security risks. Ask any CIO, IT director or IT professional what keeps them up at night and they’re likely to acknowledge cyber security risks at their organization. The reason they lose […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Page 23
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.