• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Malware Protection

Cyber Security

SMBs Ahead of Security Technology Curve

May 21, 2018 Sam Harton Leave a Comment

Enterprises have lead the charge towards malware protection for some time, but it seems that SMBs have found more cost-effective and user-friendly solutions.

Read More

More Ransomware Attacks Are Hitting Schools

December 4, 2017 TechDecisions Staff Leave a Comment

Ransomware hackers are targeting schools with weak cybersecurity, threatening to release sensitive student information unless a ransom is paid.

Read More

KRACK Exploit Puts All Devices on WiFi at Risk

October 24, 2017 TechDecisions Staff Leave a Comment

By now you may have heard of the latest cybersecurity threat, KRACK (short for Key Reinstallation AttaCK). But what exactly is it? KRACK is a vulnerability in the WPA2 security protocol used by most wireless networks today. The vulnerability allows hackers to steal data flowing between your wireless device and the targeted WiFi network, as well as potentially […]

Read More

WatchGuard Boosts Abilities of its Cyber Security Service

September 27, 2017 TechDecisions Staff Leave a Comment

WatchGuard has added endpoint protection to its cloud-based threat detection and response service which enables malware blocks outside of the network.

Read More

Cyber Attacks

What is the Worst Case Scenario for Cyber Attacks?

January 31, 2017 Megan Santosus Leave a Comment

Cyber attacks are top of mind today, with recent news about high profile incidents involving the Democratic National Committee and Yahoo dominating the headlines. While such incidents certainly lead to much hand wringing, cyber attacks perpetrated on individuals, companies and countries can have significant fallout that outlasts the current news cycle. At best, cyber attacks […]

Read More

Cyber Attack

How Does a Cyber Attack Work?

January 17, 2017 Colleen Frye Leave a Comment

You work in the financial department of your company and you just got an email from a C-level executive. It tells you to pay an invoice of $78,000 before 1 p.m., and includes instructions for how to wire the money to your vendor’s bank. You send the money, as requested, and it quickly moves to […]

Read More

government cyberattacks Google Microsoft

The Ultimate Guide to Corporate Cyber Security

January 10, 2017 TechDecisions Staff Leave a Comment

Cyber Security is hard to get a handle on. Ask even the most sophisticated experts. It’s constantly evolving and changing. Cyber criminals are coming up with new exploits as quickly as companies are able to patch them up. Cyber security is a constant battle between the “good guys” and the “bad guys.” In this case, […]

Read More

Everything You Need to Know About the Dyn DDoS Cyberattack

November 8, 2016 Jonathan Blackwood Leave a Comment

If you’ve been on the internet in the past few weeks you’ve heard about the large scale cyberattack on DNS provider Dyn. On October 21, major websites including Twitter, Amazon, Spotify, Reddit, PayPal, Airbnb, Wired, Pinterest, and more experienced outages. The common thread? Each of these sites used Dyn as their upstream DNS provider. A […]

Read More

How to Handle Internet of Things Security

October 27, 2016 Jonathan Blackwood Leave a Comment

Here are some hard truths. The Internet of Things is coming to business. You’re going to need to adopt it in some fashion if you want to survive. When you do, your network will be more susceptible to being hacked than ever. At last week’s Internet of Things Security Summit in Boston, professionals from all […]

Read More

9 Surefire Steps to Lockdown Your Cyber Security

October 20, 2016 Clinton Henry Leave a Comment

“Dear Client”.  That’s how the letter usually begins. The next few sentences are a little trickier; there is really no good way for someone to hear that their data has been stolen. Unfortunately, getting this letter is becoming an all too common occurrence in business. While a security breach might be one of the last […]

Read More

  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.