Tech news you may have missed: Sept 15 – 21 – TechRepublic

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.
We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.
Invalid email/username and password combination supplied.
An email has been sent to you with instructions on how to reset your password.
By registering, you agree to the Terms of Use and acknowledge the data practices outlined in the Privacy Policy.
You will also receive a complimentary subscription to TechRepublic’s News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.
All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).
Tech news you may have missed: Sept 15 – 21
Your email has been sent
Learn how to grant access to Excel workbook ranges, get the latest updates on the Windows 11 22H2 release and learn about the Uber hack in this week’s roundup of the news.
In a week of security breaches and product releases, these are the top stories you may have missed on TechRepublic for September 15-21, 2022.
Jump to:
While the PivotTable function is fairly easy to use in Microsoft Excel, the feature does not easily show grand totals across the table. Susan Harkins previously taught us how to display subtotals in PivotTable, and now she shows you how to build and use grand total rows.
TL;DR: This process involves several steps and is counter-intuitive at times. But the end result can ease the burden of working in PivotTables for many users.
Read the full article here.
Uber suffered a security breach on Thursday, September 15, that exposed company information via Slack and several internal databases. The breach was revealed when the hacker made a post on the ride sharing company’s internal Slack: “I announce I am a hacker and Uber has suffered a data breach.”
TL;DR: The hack occurred through social engineering techniques. While breaches of this sort cannot be completely avoided, companies should ensure the proper training and guardrails are in place to prevent and mitigate attacks before sensitive information is exposed.
Read the full article here.
In a follow-up article to last week’s breaking news of the Uber hack, Lance Whitney explains how the Lapsus$ hacker group allegedly carried out their attack on the ridesharing company. The social engineering attack was carried out in two stages: A hacker stole a contractor’s login via a fake two-factor authentication request, and another hacker purchased the credentials on the dark web and sent a series of two-factor authentication requests to the contractor. The contractor eventually accepted one of those requests, allowing entry to the systems.
TL;DR: Humans are the weakest link in the security chain. Organizations must provide ongoing training and awareness of the latest threats to help employees at all levels identify and report suspicious behaviors.
Read the full article here.
Password protection in Microsoft Excel is useful for limiting access to full worksheets or data sets, but it can also be used to allow multiple users to access data while limiting the data each can edit. Susan Harkins shows you how to use the Allow Edit Ranges feature to do this.
TL;DR: You can password protect an entire sheet, while also allowing access for individual users to update the cells you assign to them. This password protection is not a security measure, however, and is intended to prevent users overwriting their colleagues’ work.
Read the full article here.
Windows has released an update to Windows 11 and will continue to roll out new features monthly and as part of Patch Tuesdays. This schedule of regular updates is meant to increase the security and usability of the operating system, while giving IT professionals more control over what they release to organizations.
TL;DR: Don’t count on new features to be released every month. The new system is meant to ensure that Microsoft is releasing quality features when they’re ready and not according to an artificial deadline like an annual release.
Read the full article here.
Our editors highlight the TechRepublic articles, downloads, and galleries that you cannot miss to stay current on the latest IT news, innovations, and tips.
Tech news you may have missed: Sept 15 – 21
Your email has been sent
Your message has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
Windows 11 gets an annual update on September 20 plus monthly extra features. In enterprises, IT can choose when to roll those out.
Edge AI offers opportunities for multiple applications. See what organizations are doing to incorporate it today and going forward.
This is a complete guide for Apple’s iPadOS. Find out more about iPadOS 16, supported devices, release dates and key features with our cheat sheet.
Discover data intelligence solutions for big data processing and automation. Read more to explore your options.
Whether you are a Microsoft Excel beginner or an advanced user, you’ll benefit from these step-by-step tutorials.
Edge computing is an architecture intended to reduce latency and open up new applications. The terms around it can be fluid, but are helpful to know. From the glossary’s introduction: Edge computing is an architecture which delivers computing capabilities near the site where the data is used or near a data source. In an idealized …
This document helps make sure that you address data governance practices for an efficient, comprehensive approach to data management. This checklist from TechRepublic Premium includes: an introduction to data governance, a data governance checklist and how to manage a data governance checklist. From this checklist’s introduction: Data governance is the process by which an organization …
Recruiting a Scrum Master with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit provides a customizable framework your business can use to find, recruit and ultimately hire the right person for the job. This hiring kit from TechRepublic Premium includes a job description, sample interview questions …
Knowing the terminology associated with Web 3.0 is going to be vital to every IT administrator, developer, network engineer, manager and decision maker in business. This quick glossary will introduce and explain concepts and terms vital to understanding Web 3.0 and the technology that drives and supports it.

source

Leave a Comment

Your email address will not be published.