Boost Missouri government cyber security training for better audits

June 6, 2024
1 min read

TLDR:

– State audit says many state employees in Missouri lack cyber security training and awareness
– Audit recommends improved oversight for security awareness training and implementation of training and phishing testing

In a growing era of computer system hacks and ransomware attacks, State Auditor Scott Fitzpatrick highlights the importance of effective security awareness training for state employees in Missouri. The audit reviewed awareness and training efforts for 34 state government entities that include nearly 52,000 state employees. Fitzpatrick emphasizes the need for recurrent training on the latest risks related to cybersecurity to reduce the likelihood of data breaches or ransomware attacks.

Fitzpatrick stresses that the rapid advancement of technology has made government operations more efficient but has also increased the risk for data breaches and computer hacks that could disrupt essential services. The audit recommends improved oversight for security awareness training and the implementation of training and phishing testing to enhance cyber security measures within state government agencies.

It is essential for state employees to have enough exposure to cybersecurity training on a recurring basis so that they can recognize and respond to potential risks effectively. By prioritizing security awareness training, Missouri government agencies can better protect the personal information of citizens and employees and reduce vulnerabilities to cyber threats.

Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives