[ad_1]
This past week’s most-read stories about ransomware trends in 2022, attempts to steal Microsoft user credentials, and key project management steps.
In a week of phishing attacks and virtual tips, these are the top stories you might have missed in Tech Republic for October 8-13, 2022.
jump
2022 Threat Status: Ransomware is still hitting companies hard.
The total number of ransomware threats in 2022 did not change significantly, but as the 2022 Threat Status Report shows, the targets and their velocity have changed. Cédric Pernet’s risk analysis indicates that small businesses and individuals are most vulnerable to ransomware, and threat actors have shortened the time between breach and action.
See: The Covid-19 Gender Gap: Why Women Quit and How to Get Back to Work (Free PDF) (TechRepublic)
TL;DR: Despite the demise of the major ransomware groups and better understanding on the part of security professionals, today’s threats are harder to detect and act on quickly than ever before.
Read the full analysis here.
How to choose the best anchor power station for remote work
Choosing the right power station for your business during a power outage or on the road is critical to maintaining a continuous connection. But Patrick Gray gives us some simple calculations and usage considerations to help you choose the right model to get you going.
TL;DR: Consider capacitance, AC output, and number of connection points in your research. Anker Power Stations have a variety of options for many use cases.
Read the full article here.
9 Things You Shouldn’t Do in Fantasy
Planning to dive into virtual machines? Not so fast, says TechRepublic Lead Writer for Edge, Megan Crouse. VMs are not helpful for every IT department or every situation. Considering your resources is key to getting use cases and ultimately your organization’s ecosystem right.
TL;DR: Think carefully about the problem you want to solve before you push yourself into a security, redundancy, or efficiency hole.
Read the full article here.
Phishing attacks aim to steal Microsoft user credentials
Attackers are trying to steal Microsoft user credentials by sending emails from an encrypted domain. The emails ask targets to enter their Microsoft credentials to retrieve the messages they expect on zooming. Once the target enters their credentials, the attacker can use them to access key accounts.
TL;DR: Lance Whitney covers a number of ways that companies and employees can protect against these types of phishing scams, including using 2-factor authentication for all accounts, which makes attacks of this form futile.
Read the full article here.
5 levels of project management
Lack of resources? Too many questions? Not enough time? These problems can spell doom for any project, but your next project could be stymied by an unexpected threat: poor management. Instead of firing your project manager (in this economy?), make sure they’re under control with this checklist.
TL;DR: Madeleine Clark reminds us that a well-planned project that goes through each step ensures that all stakeholders agree on expectations and deliverables.
Read the full article here.
[ad_2]
Source link