Reported by: Shahirah Abdul Aziz As organizations prepare to tackle the challenges of 2025, achieving business goals requires more than just managing individual projects. Portfolio Project Management (PPM) empowers businesses to align their resources, time, and energy with strategic objectives, ensuring maximum value from every initiative. But how can organizations leverage PPM to set themselves apart? The answer lies in mastering six critical pillars.
Managing large-scale utility projects across multiple countries is no small feat. When you're responsible for powering millions of homes and businesses, efficiency isn't just a buzzword — it's a necessity.
That's why when Tenaga Nasional Berhad (TNB), Malaysia's leading utility company with operations across six countries, faced challenges with scattered project data and manual reporting processes, they knew something had to change. Reported by: Shahirah Abdul Aziz Supply chain attacks represent one of the most challenging threats in cybersecurity today. By targeting trusted third-party suppliers, attackers bypass traditional defences, gaining unauthorized access to secure networks and systems. These attacks, such as the XZ upstream supply chain compromise highlighted by Bitdefender, demonstrate the urgency for organizations to bolster defences against indirect threats.
Reported by: Shahirah Abdul Aziz In today's digital landscape, ransomware attacks have become a significant threat to organizations worldwide. With the growing sophistication of these attacks, businesses and government agencies are under immense pressure to enhance cybersecurity while managing tight budgets. This article explores practical, cost-effective strategies to strengthen ransomware defences by emphasizing proactive investments, managed security services, and a layered security approach.
Reported by: Shahirah Abdul Aziz As we navigate 2024, ransomware remains one of the most persistent and devastating cyber threats. Ransomware attacks have surged in frequency, targeting businesses of all sizes, as well as individuals. With evolving tactics and increasingly advanced ransomware, organizations must protect their critical data and systems from these costly attacks. In this article, we’ll explore what ransomware is, the different types, the most common variants in 2024, and how companies can detect and prevent them.
Reported by: Amir Syafiq Ezrin What is a Phishing Attack?
Phishing is a cyberattack technique where attackers attempt to trick individuals into revealing sensitive information such as usernames, passwords, credit card numbers, or other confidential data. Typically, attackers pose as trustworthy entities, luring victims with compelling requests or offers. The term "phishing" is derived from the concept of "fishing," as attackers bait their targets into providing the information they seek. What is Deepfake Technology? Deepfake technology uses artificial intelligence, particularly deep learning, to create hyper-realistic fake images, videos, and audio recordings. The technology can modify existing content by swapping one person for another or generate entirely new content that depicts individuals saying or doing things they never did. While deepfakes can be used for entertainment or legitimate purposes, they also pose significant risks by spreading disinformation that appears to originate from credible sources. What is Generative AI (GenAI)? Generative Artificial Intelligence (GenAI) refers to AI systems designed to create new content, ideas, or data that mimic human creativity. By leveraging deep learning algorithms, GenAI can produce outputs such as text, images, music, and even code. Popular models like Generative Pre-trained Transformers (GPT) and Variational Autoencoders (VAEs) allow these AI systems to analyze vast datasets, learning patterns to generate original content that closely resembles the input data. Digital Transformation and the Future of Work: What Businesses Need to Know.Digital transformation has been a buzzword in the business world for several years now, and for good reason. With the rapid advancements in technology and the growing demands of consumers, companies must adapt to stay competitive.
A Summary of Smartsheet Future of Work Management Report 2023 The emergence of ChatGPT serves as a reminder that the world is undergoing a transformation and advancing towards the age of AI. The crucial question that remains unanswered is whether human beings will be replaced by AI in the future. To prevent this catastrophic outcome, we must strive to keep pace with the world's evolution by adopting new technological tools and integrating them into our daily lives. This not only ensures our survival in an AI-dominated world but also facilitates our productivity and adaptability in a rapidly changing environment.
Issue : Unable to access Smartsheet account on my Web Browser ![]() Most of the time, we seen this issue is mainly caused by the user's hardware and browser. The browser clearly indicated the error message as "This site can't be reached https://app.smartsheet.com is unreachable" The bottom of the message also provided "Try running Windows Network Diagnostics" Kindly refer to these two-steps guide mentioned below and follow the best-practice guide, and your problem will be mostly resolved forever. Step 1 : Check Hardware
![]() 👈🏻 If your Windows's Network Card (WiFi or Ethernet Cable) doesn't have a valid IP configuration, please refer to this fix guide : https://windowsreport.com/wi-fi-valid-ip-configuration-windows-10 ![]() Best practice: we highly recommended to manually add these DNS addresses for best browsing experience. Here is the detail to further tweak your Network Card setting. Refer to this guide: https://www.digit.in/features/tech/tweak-network-adapter-properties-networking-ethernet-wifi-vpn-45243.html Try to disable and then re-enable your network card again after you have added the DNS setting mentioned above. Step 2 : Check Internet Browser For other Smartsheet tips, you can refer here: https://help.smartsheet.com/topics/tips-and-troubleshooting
|