As an IT project manager, you need a place to create and make decisions with your team. With the right platform, there’s no limit to what you can achieve. Using a collaboration solution like Teams brings everything together in a shared workspace where you can chat, meet, share files, and work with business apps. Interested in learning more about the benefits of using Teams? Contact us today to find out some of the unique benefits it has over other platforms.
As a global leader in professional staffing, career transition, and talent mobility, the Adecco Group has been transforming the world of work. They help customers embrace the changing employment landscape and develop new ways of working. With 34,000 team members across the globe, they needed more effective ways to collaborate in real time and a better way to access data for driving good decisions.
Microsoft 365 equips HR leaders with the people data needed to drive business and cultural transformation. Now these leaders can tap into the idea of working out loud and stimulating employee creativity with Microsoft Teams. And with Power BI, they’ve unlocked data so they can get the analysis they need, right on the spot!
Check out how Adecco is creating the future of work in these two brief videos!
Swedish real estate company Landgren has made a name for itself by being ahead of the technological curve and prioritizing innovation. So far, Landgren has capitalized on standing out from the crowd, but here’s the catch: The company has no IT department. Using security solutions from Microsoft 365 allows Landgren to comply with strict European data privacy standards, ensuring that the company is protected against data loss and cyberattacks.
Ryuk Adds New Features to Increase Devastation
The latest variant of the devastating Ryuk ransomware has been spotted with a new feature that allows it to turn on devices connected to the infected network. By taking advantage of Wake-on-Lan functionality, Ryuk can is able to mount additional remote devices to further its encryption protocols. While it’s possible to only allow such commands from an administrator’s machine, those are also the most likely to be compromised since they have the largest access base.
Bank Hackers Arrested Outside London
Over the course of six years, two individuals were able to successfully hack into many hundreds of bank and phone accounts with the intent to commit fraud. With the information they gathered, the two were also able to open new credit accounts and take out significant loans to purchase extra tech hardware. Officials for the London Metropolitan Police have made it known that cybercrime is taken just as seriously as any other crime.
Cryptominer Found After Multiple BSODs
Following a series of “blue screens of death” (BSoDs) on a medical company’s network, researchers identified a cryptominer that spread to more than 800 machines in just a couple months. The payload, a Monero miner, was hidden within a WAV file that was able to migrate undetected to various systems before executing the payload itself. To spread efficiently, the infection used the long-patched EternalBlue exploit that had not yet been updated on the network in question, thus leaving them fully susceptible to attack.
Consulting Firm Exposes Professional Data
Thousands of business professionals from the UK have potentially fallen victim to a data leak by the major consulting firm CHS. A server belonging to the company was found to contain passports, tax info, and other sensitive information that could have been archived from background checks within an unsecured Amazon Web Services bucket. While it is still unclear how long the data was available, researchers who discovered the leak quickly contacted both CERT-UK and Amazon directly, which promptly secured the server.
Western Australian Bank Breached
Over the last week officials for P&N Bank in Australia have been contacting their customers concerning a data breach that occurred during a server upgrade in early December. Though personally identifiable information has been exposed, it doesn’t appear that any accounts have been illicitly accessed and relates more to a customer’s contact information. A total number of affected customers has yet to be confirmed.