Tech News You Might Have Missed: October 8 – 13

    Insights into ransomware trends in 2022, Microsoft’s attempt to steal user credentials, and key project management steps are featured in our compilation of last week’s most read stories. I.

    Image: Christina Morillo / Pexels

    In a week of phishing attacks and virtualization tips, here are the top TechRepublic stories you might have missed for October 8-13, 2022.

    Move in:

    Threat Status 2022: Ransomware Still Attacking Companies

    A padlock icon with red dots represents malware.
    Image: Alex / Adobe Stock

    The total number of ransomware threats did not change significantly throughout 2022, but as the State of Threats 2022 report shows, the goals and pace have changed. Cedric Pernet’s analysis of the threat indicates that smaller businesses and individuals are at greater risk of ransomware, and that threat actors have reduced the time from breach to action.

    SEE: The COVID-19 gender gap: Why women leave their jobs and how to get them back (free PDF) (TechRepublic)

    TL; DR: While large ransomware groups have disbanded and security professionals are more aware, today’s threats are harder to detect and act on faster than ever before.

    Read the full analysis here.

    How to choose the best Anker power station for remote work

    Anker 535 PowerHouse mobile power station.
    Image: Anker. PowerHouse 535

    Choosing the right power station to power your business during a power outage or outage on the road is critical to maintaining a constant connection. But Patrick Gray gives us some simple calculations and usage considerations to help you choose the right model to keep going.

    TL; DR: Consider the wattage, AC output, and number of connection points in your research. Anker power station has a wide range of options for a variety of use cases.

    Read the full article here.

    9 things you should not virtualize

    The server has a green light in the data center.
    Image: railfx / Adobe Stock

    Planning to dive into virtual machines? Not that fast, said Megan Crouse, TechRepublic Lead Writer for Edge. Virtual machines are not useful for every IT department or every situation. Considering your resources, use cases, and ultimately your organization’s ecosystem is key to doing the right virtualization.

    TL; DR: Carefully consider the problem you’re hoping to solve before virtualizing yourself into a security, fallback, or performance vulnerability.

    Read the full article here.

    Phishing attack spoofs Zoom to steal Microsoft user credentials

    fraud and cybercrime concept.  Fishing hook on computer keyboard.  copy space
    Image: ronstik / Adobe Stock

    Attackers are trying to steal Microsoft users’ credentials by sending emails from the Zoom domain. The emails require the target to enter their Microsoft credentials to retrieve the messages waiting for them on Zoom. After the target enters their credentials, the attacker can use them to gain access to key accounts.

    TL; DR: Lance Whitney mentions a number of ways companies and employees can protect against these types of scams, including using 2-factor authentication for all accounts, which will make your accounts vulnerable to scams. This kind of attack is useless.

    Read the full article here.

    5 steps of project management

    A team in the defining and planning phase of project management.
    Image: fauxels / Pexels

    Lack of resources? Too many requests? Not enough time? These problems can spell doom for any project, but your next project could be thwarted by a threat you didn’t expect: poor management. Instead of firing your project manager (in this economy?), make sure they have everything under control with this checklist.

    TL; DR: Madeline Clarke reminds us that a well-planned project proceeds step-by-step through each phase ensuring that all stakeholders cooperate based on expectations and agree on outcomes.

    Read the full article here.

    Recent Articles


    Featured Article

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox