Skip navigation
Year in Review
padlock_against_digital_background_alamy.jpg Alamy

Top 10 Stories About Enterprise Threat Management in 2022

ITPro Today’s most-read articles about threat management covered ransomware prevention, cybersecurity training, mobile security, and emerging risks.

IT professionals this year sought guidance on how to identify ransomware attacks and fix vulnerabilities in their systems and software. In ITPro Today’s most-read articles about threat management, we examined how cybersecurity approaches are adapting to new categories of threats.

Review our top 10 articles about threat management for tips, best practices, and insight into trends.

1. Fake Windows Updates Trick Users Into Installing Ransomware

ITPro Today contributor Brien Posey reported on ransomware that spreads via fake Windows updates. This article explains what to look out for and best practices for protecting users.

Further Reading: Ransomware Security for IT Pros: 2022 Report 

2. Accelerometer Data and Its Security Implications

Accelerometers, which detect motion in smartphones, can reveal a surprising amount of data about users’ behavior. Learn how accelerometer data can be creatively exploited and could eventually be used to improve security.  

3. How to Spot the Warning Signs of Ransomware Attacks

If you look for it, you can often detect the early signs of a ransomware attack in progress. This article outlines the indicators of both an automated or human-operated ransomware infection.


4. Why Providers Are Retooling Cybersecurity Awareness Training

ITPro Today contributor Karen D. Schwartz reported on why traditional cybersecurity training methods are failing. New methods have emerged that center on a better understanding of human risk.

Further Reading: How Leidos Tackled Cybersecurity Skills Shortage Through Education

5. How To Prevent Software Vulnerabilities in Commercial Applications

Software vendors can’t be fully entrusted to eliminate vulnerabilities in their products. As a result, organizations must take up additional security measures in case their vendors drop the ball.

Further Reading: The State of Software Security Testing Tools in 2022

6. 5 Types of Cybersecurity Skills That IT Engineers Need

As the threat landscape becomes increasingly complex, it’s more important than ever that IT engineers understand cybersecurity. This explainer describes the tools, skills, and knowledge IT engineers should have. 

7. 6 Mobile Security Tips for Hybrid Workforces

Security breaches on smartphones pose a significant threat to organizations in all industries. These six tips aim to help organizations rethink their mobile security strategies. 

Further Reading: Mobile Threats Skyrocket

8. 70 Percent of Breached Passwords Still in Use

SpyCloud's 2022 Identity Exposure Report raised the alarm about the number of compromised passwords that remain in use. The findings highlighted poor password hygiene and the need for better practices and individual behavior. 

9. Secure Open Source Software Is Helping Enterprises Find Their Edge

The use of open source software has both empowered organizations and left them vulnerable to software threats. Find out what the Open Source Security Foundation is doing to make open source secure.

Further Reading: The Securing Open Source Software Act Highlights Growing Risks

10. Key Application Security Metrics Show Few Signs of Improvement

Organizations are slow to respond to security vulnerabilities, according to a NTT Application Security report released in February. This article from ITPro Today’s sister site Dark Reading details the causes for this concerning trend.

What are your 2023 predictions for enterprise threat management? Share your predictions in the comments below!

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.