GreenPages Blog

As an IT professional, you need to stay current on all things tech; with articles from industry experts and GreenPages' staff, you get the info you need to help your organization compete and succeed!

All Posts

Tech News Recap for the Week of 06/06/22

If you had a busy week and need to catch up, here’s our recap of tech stories you may have missed the week of 06/06/22!

IT Operations





  • Hackers are now hiding inside networks for longer. That's not a good sign

  • 11 infamous malware attacks: The first and the worst

  • NSA, FBI warning: Hackers are using these flaws to target VPNs and network devices

  • CISA warning: Hackers are exploiting these 36 "significant" cybersecurity vulnerabilities - so patch now

  • This new Linux malware is 'almost impossible' to detect

  • Ransomware attacks have dropped. And gangs are attacking each other's victims

  • FBI warning: This gang steals data for ransom, then makes harassing phone calls to pile on the pressure

Thanks for checking out our tech news recap!

By Jake Cryan, Digital Marketing Specialist

Related Posts

CIO Fireside Chat Recap: Responding to a Ransomware Attack

By Mario Brum, VP of Practice Area and Technical Advisory Services, GreenPages   Mario Brum hosted our inaugural CIO Fireside Chat, an online event for business executives and IT experts about the latest tech topics and trends. In this blog post, Mario recaps the discussion on responding to ransomware attacks and shares data from a real-time poll showing how top cybersecurity leaders responded to this controversial topic. 

How Microsoft Purview Simplifies and Secures Your Organization's Data

By David Barter, GreenPages Microsoft Technologies Practice Lead Managing disparate data sources is a challenge for today's hybrid workforces. But Microsoft Purview can simplify your data security, governance, and compliance.

Why MFA Is a Must-have Cybersecurity for Business

By Jay Martin, GreenPages Security Practice Lead Multifactor authentication can protect today's hybrid workforces from cyberattacks designed to steal, destroy, or ransom a company's extremely valuable data.