GreenPages Blog

As an IT professional, you need to stay current on all things tech; with articles from industry experts and GreenPages' staff, you get the info you need to help your organization compete and succeed!

All Posts

Tech News Recap for the Week of 08/23/21

If you had a busy week and need to catch up, here’s our recap of tech stories you may have missed the week of 08/23/21!


GreenPages' Virtual Cloudscape 2021: Digitally Enabled. Cyber Secured. 

Register Now!


IT Operations

Microsoft

Cisco

AWS

Security

  • "Intruders" in the cloud: Microsoft warns "thousands" of customers about potential exposure

  • Cybersecurity warning: Realtek flaw exposes dozens of brands to supply chain attacks

  • Ransomware: It's only a matter of time before a smart city falls victim, and we need to take action now

  • FBI releases alert about Hive ransomware after attack on hospital system in Ohio and West Virginia

  • 4 most dangerous emerging ransomware threat groups to watch

 

Thanks for checking out our tech news recap!

By Jake Cryan, Digital Marketing Specialist

Related Posts

CIO Fireside Chat Recap: Responding to a Ransomware Attack

By Mario Brum, VP of Practice Area and Technical Advisory Services, GreenPages   Mario Brum hosted our inaugural CIO Fireside Chat, an online event for business executives and IT experts about the latest tech topics and trends. In this blog post, Mario recaps the discussion on responding to ransomware attacks and shares data from a real-time poll showing how top cybersecurity leaders responded to this controversial topic. 

How Microsoft Purview Simplifies and Secures Your Organization's Data

By David Barter, GreenPages Microsoft Technologies Practice Lead Managing disparate data sources is a challenge for today's hybrid workforces. But Microsoft Purview can simplify your data security, governance, and compliance.

Why MFA Is a Must-have Cybersecurity for Business

By Jay Martin, GreenPages Security Practice Lead Multifactor authentication can protect today's hybrid workforces from cyberattacks designed to steal, destroy, or ransom a company's extremely valuable data.