• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Cybersecurity

Progress MOVEit vulnerability

The Rise of Triple Extortion Ransomware

August 11, 2021 Zachary Comeau Leave a Comment

If you aren’t already familiar with ransomware, the increasing frequency of such attacks and the level of sophistication with which cybercriminal gangs deploy the malware, then you need to be paying more attention. The prevailing trend over the course of the last few years is the rise of double extortion, which means that the purpose […]

Read More

1Password Browser Extension

Stop Making Passwords Too Complex

August 10, 2021 Zachary Comeau Leave a Comment

If you’re still requiring users to create complex passwords with a combination of letters, numbers and symbols, think again, says the U.K.’s National Cyber Security Centre. The NCSC, the U.K. counterpart to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), maintains that complexity requirements and making users regularly change passwords is actually less secure than […]

Read More

Cybersecurity Certifications

Entry-Level Cybersecurity Certifications You Need In 2021

August 9, 2021 Zachary Comeau Leave a Comment

IT teams everywhere have been busy over the last year and a half helping their organization transition to remote work, and then back to a hybrid work environment as the COVID-19 pandemic began to subside earlier this year. As organizations were scrambling to adopt new technologies and solutions to accommodate those work models, cybercriminals seized, […]

Read More

Threat Detection Trends, 2023 Hacking Trends, Expel

What You Need To Know About Vulnerabilities and Data Breaches in 2021

August 5, 2021 Zachary Comeau Leave a Comment

A pair of new reports from Risk Based Security find that disclosed software and hardware vulnerabilities continue to increase while reported data breaches in most parts of the world decline. For IT administrators struggling to keep pace with the rapid changes in cybersecurity, the reports provide some useful insight into exactly what you’re up against. […]

Read More

Phishing

Microsoft Warns of Sneaky Phishing Campaign

August 2, 2021 Zachary Comeau Leave a Comment

Microsoft is warning of an active phishing campaign that uses a combination of techniques to evade detection and trick users into giving up their credentials. In a series of Tweets and updates on GitHub, Microsoft’s security team says the active phishing campaign uses a “craft combination” of legitimate-looking original sender email addresses, spoofed display sender […]

Read More

Cybersecurity Skills Gap

Cybersecurity Skills Gap Is Getting Worse, Report Says

August 2, 2021 Zachary Comeau Leave a Comment

Threat actors are becoming more skilled and attacks are increasing in level of sophistication, and the cybersecurity workforce can’t keep pace, according to a new study from the Information Systems Security Association. The study, conducted by ISSA and analyst firm Enterprise Strategy Group, found that organizations largely are not investing enough into their cybersecurity workforce […]

Read More

Data Breaches Average Cost

Report: Pandemic Led to More Expensive Data Breaches

July 30, 2021 Jess DeWitt Leave a Comment

According to a report by IBM security, data breaches hit record highs in terms of cost due to the COVID-19 pandemic. Even before the pandemic, data breaches were becoming a more frequent problem for organizations, but due to multiple factors, they became more problematic in the past year. IBM Security hired Ponemon Institute to compile […]

Read More

NSA Programming Languages

Make Cybersecurity Part Of Your Power Management Lesson Plan

July 29, 2021 Hervé Tardy Leave a Comment

IT infrastructure and cyber security considerations for protecting power devices from potential cyberattacks.

Read More

Microsoft Security RSA Conference

Microsoft: How To Prevent NTLM Relay Attack

July 26, 2021 Zachary Comeau Leave a Comment

Microsoft has shared instructions on how to mitigate PetitPotam, an NT Lan Manager (NTLM) relay attack used against Windows domain controllers or servers. The company did not say if the vulnerability is currently being exploited. Microsoft called it a “classic” NTLM relay attack that allows an attacker to take over a domain controller or other […]

Read More

No More Ransom

Check This Resource Out Before Paying a Ransom Or Restoring Data

July 26, 2021 Zachary Comeau Leave a Comment

When your computer systems are infected with ransomware, you may think you only have two options: pay to (maybe) have all your data decrypted by the hackers or start the long and arduous process of restoring everything. Those two options have their pros and cons. Paying the ransom can be a quick fix, but it’s […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 36
  • Page 37
  • Page 38
  • Page 39
  • Page 40
  • Interim pages omitted …
  • Page 48
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.