Insights into ransomware trends in 2022, Microsoft’s attempt to steal user credentials, and key project management steps are featured in our compilation of last week’s most read stories. I.
In a week of phishing attacks and virtualization tips, here are the top TechRepublic stories you might have missed for October 8-13, 2022.
Move in:
Threat Status 2022: Ransomware Still Attacking Companies

The total number of ransomware threats did not change significantly throughout 2022, but as the State of Threats 2022 report shows, the goals and pace have changed. Cedric Pernet’s analysis of the threat indicates that smaller businesses and individuals are at greater risk of ransomware, and that threat actors have reduced the time from breach to action.
SEE: The COVID-19 gender gap: Why women leave their jobs and how to get them back (free PDF) (TechRepublic)
TL; DR: While large ransomware groups have disbanded and security professionals are more aware, today’s threats are harder to detect and act on faster than ever before.
Read the full analysis here.
How to choose the best Anker power station for remote work

Choosing the right power station to power your business during a power outage or outage on the road is critical to maintaining a constant connection. But Patrick Gray gives us some simple calculations and usage considerations to help you choose the right model to keep going.
TL; DR: Consider the wattage, AC output, and number of connection points in your research. Anker power station has a wide range of options for a variety of use cases.
Read the full article here.
9 things you should not virtualize

Planning to dive into virtual machines? Not that fast, said Megan Crouse, TechRepublic Lead Writer for Edge. Virtual machines are not useful for every IT department or every situation. Considering your resources, use cases, and ultimately your organization’s ecosystem is key to doing the right virtualization.
TL; DR: Carefully consider the problem you’re hoping to solve before virtualizing yourself into a security, fallback, or performance vulnerability.
Read the full article here.
Phishing attack spoofs Zoom to steal Microsoft user credentials

Attackers are trying to steal Microsoft users’ credentials by sending emails from the Zoom domain. The emails require the target to enter their Microsoft credentials to retrieve the messages waiting for them on Zoom. After the target enters their credentials, the attacker can use them to gain access to key accounts.
TL; DR: Lance Whitney mentions a number of ways companies and employees can protect against these types of scams, including using 2-factor authentication for all accounts, which will make your accounts vulnerable to scams. This kind of attack is useless.
Read the full article here.
5 steps of project management

Lack of resources? Too many requests? Not enough time? These problems can spell doom for any project, but your next project could be thwarted by a threat you didn’t expect: poor management. Instead of firing your project manager (in this economy?), make sure they have everything under control with this checklist.
TL; DR: Madeline Clarke reminds us that a well-planned project proceeds step-by-step through each phase ensuring that all stakeholders cooperate based on expectations and agree on outcomes.
Read the full article here.