IT Worker Survey

West Kentucky IT Worker Survey The Technology Council of West Kentucky is performing an analysis of our regional IT workforce to better understand our technology workers. Recruiting and Retaining a qualified workforce remains the most significant challenge for our technology companies in West Kentucky. This survey is an attempt to understand our workers better. We … Read more IT Worker Survey

Murray State University Introduces Cybersecurity and Network Management Program

Murray State University Introduces Cybersecurity and Network Management Program University renames its telecommunications systems management program of distinction MURRAY, Ky. — Murray State University has renamed its award-winning telecommunications systems management Bachelor of Science program — designated a program of distinction —to cybersecurity and network management (CNM). The change took effect July 1, 2020.  Though … Read more Murray State University Introduces Cybersecurity and Network Management Program

Sprocket, Inc., Regional Partners, Announce $322,000 KY Innovation Funding, GroWest Coalition

Sprocket, Inc., Regional Partners, Announce $322,000 KY Innovation Funding, GroWest Coalition Sprocket, Inc., along with Murray State University Center for Computer and Information Technology, The Technology Council of West Kentucky, the Murray State University Center for Economic and Entrepreneurial Development, and Kentucky Innovation Station (Madisonville Hopkins County Economic Development Corporation) is pleased to announce the … Read more Sprocket, Inc., Regional Partners, Announce $322,000 KY Innovation Funding, GroWest Coalition

Watch for storms when using the ‘cloud’

Watch for storms when using the ‘cloud’ For the past five months, this column has examined the top threats in 2019, according to the 2019 Cyber Threatscape Report, including geopolitical actors, evolving cybercriminals, ransomware, supply chain threats, and supply chain vulnerabilities. This month, we are focusing on the final threat from the report, cloud vulnerabilities. … Read more Watch for storms when using the ‘cloud’

Cyber threats include your supply chain

Cyber threats include your supply chain Over the last few months, this column has examined the top threats in 2019, according to the 2019 cyber threatscape report, including geopolitical actors, evolving cybercriminals, ransomware, supply chain threats, and cloud vulnerabilities. This month we are focusing on the threat from your organization’s supply chain. First, let’s revisit … Read more Cyber threats include your supply chain

Cybercrime impacts business, large or small

Cyberthreats are real, so protect yourself Last month was the start of a five-part series for this column about the cyber threats facing individuals and businesses in our region. As noted previously, the top threats in 2019 include geopolitical actors, evolving cybercriminals, ransomware, supply chain threats, and cloud vulnerabilities. Each threat could have a negative … Read more Cybercrime impacts business, large or small

Cyberthreats are real, so protect yourself

Cyberthreats are real, so protect yourself Photo Credit: https://www.teiss.co.uk Cybercrime is one of the largest threats facing every individual and business in our country. According to the 2019 Cyber Threatscape Report, the top threats in 2019 include geopolitical actors, evolving cybercriminals, ransomware, supply chain threats, and cloud vulnerabilities. Each threat could have a negative impact … Read more Cyberthreats are real, so protect yourself

Lack of cybersecurity improvement should be concern for everyone

Lack of cybersecurity improvement should be concern for everyone A recent cybersecurity survey paints a picture of the current threats and challenges facing cybersecurity professionals. The picture is not pretty, and it matters to your business and organization. The Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) conducted their third annual survey … Read more Lack of cybersecurity improvement should be concern for everyone

Creating a security framework that works

Creating a security framework that works www.nist.gov   Even after a large number of data breaches over the last few years, I continue to hear questions about the relevance of cybersecurity best practices to small and medium-sized businesses. Small business owners don’t believe their small business would be a target for cyber criminals. Let me … Read more Creating a security framework that works

Risk management requires continuous effort

Risk management requires continuous effort Every organization faces risks. Corporate risks come in many forms: financial, operational and security, many with a human element. Identifying and managing those risks, especially those cybersecurity risks, may not be the most exciting part of running your business, but one of the most important from both a reputation and … Read more Risk management requires continuous effort