March 2025 Tech Upload

The NEW Digital Alliance would like to thank Fox Valley Technical College, Moraine Park Technical College and Northeast Wisconsin Technical College for their support as our educational partners and Strategic Level investors!

NEW Digital News

🚀 Inspiring the Next Generation of Tech Talent!

2025 CX2 - NEW Technology Career Exhibit

The NEW Digital Alliance was thrilled to co-host the 2nd annual Careers to Explore Technology Career Exhibit at the Fox Cities Performing Arts Center on February 4! This event gave area high school students the opportunity to explore exciting careers in IT, technology, and STEM, connecting them with regional industry professionals to help spark curiosity and innovation into their future careers.

A huge THANK YOU to our incredible sponsors and volunteers—your support makes events like this possible and helps shape the future of our tech workforce. Together, we’re building a stronger pipeline of talent for Northeast Wisconsin! 

Kimberly-Clark | Thrivent | Microsoft | FTI | Plexus | U.S. Venture | Zeytech | Tanduo Technical Partners | EnvisionInk Printing Solutions | Pete Dulcamara & Associates | Mars

Enjoy some pictures of the event. 
View photo album here

Microsoft Copilot Scenario Library

Empower Business Productivity with Microsoft 365 Copilot AIBecoming AI powered means transforming scenarios across your organization. Use our guidance by department and individual scenario to get inspired, empower your workforce and realize value from your Microsoft Copilot investment.

Everyone can start with the free version of Microsoft Copilot on the web or mobile to assist with everyday tasks – for examples, check out the “Microsoft Copilot only” scenarios.

Copilot for Microsoft 365 builds on this by connecting with your work data and is available in the apps you use every day. You can take Copilot even further with Copilot Studio and other Copilot extensions to streamline business processes.

View Microsoft Copilot Scenario Library here

Labor Market Insights: February 2025

By Matt Duffy, Carex Consulting

If I had a nickel for every time I was asked “how is the labor market?”, I wouldn’t be rich, but I’d stop complaining about the cost of Starbucks. When asked about the labor market, I typically give a long and meandering response that rarely answers the actual question. For the foreseeable future, I’ve refined my answer to three words: “fine, but vulnerable.” Most of the key indicators support the first word: “fine” (4% unemployment is surprisingly low, job growth remains robust, separations remain very low, etc.). However, the indicator I pay the most attention to—the hiring rate—makes me include the final two words: “but vulnerable.”

Read full article here

From Intern to Analyst: My Journey in Cybersecurity

By Matt Wedemeyer
Faith Technologies Incorporated

Cyber threats are constantly evolving, and organizations must stay ahead of the curve. For aspiring cybersecurity professionals, hands-on experience is crucial. In a recent blog post, Faith Technologies Incorporated (FTI) takes readers inside the daily routine of a cybersecurity intern, showcasing the skills, challenges, and real-world applications that shape their journey.

From monitoring security alerts to conducting vulnerability assessments and collaborating with IT teams, interns at FTI gain invaluable experience in protecting digital assets. The blog highlights how mentorship, continuous learning, and exposure to cutting-edge security practices prepare the next generation of cybersecurity experts.

Want to learn more about the fast-paced world of cybersecurity internships?

Read full article here

Why an Information Security Policy, Standards, and Procedures Should Be Top Priority

By Heartland Business Systems

Information security policies often fall to the bottom of a company’s to-do list. They aren’t flashy, and writing them isn’t exciting. But these documents are the backbone of a secure and efficient organization. Investing time in a well-structured information security policy now will better protect your organization from threats, drastically improve compliance, and streamline operations.

In today’s digital landscape, safeguarding sensitive information is more critical than ever. A well-structured cybersecurity framework hinges on three key elements: policies, standards, and procedures.

  • Policies set the overarching expectations for security practices within an organization.
  • Standards establish specific requirements to ensure consistency and compliance.
  • Procedures provide step-by-step guidance to implement these policies effectively.

By aligning these elements, businesses can enhance security, mitigate risks, and create a culture of compliance. Learn how to develop a robust cybersecurity framework in this insightful blog post.

Read full article here

Other IT News

2nd Annual Cyber Invader Hackathon at UW-Oshkosh: Empowering Future Cybersecurity Experts

The Cybersecurity Center of Excellence at the University of Wisconsin-Oshkosh, in collaboration with the Wisconsin Department of Public Instruction, is thrilled to host the 2nd Annual Cyber Invader Hackathon on April 2, 2025 at UW-Oshkosh. This exciting event is specifically designed for high school students, providing them with a unique opportunity to dive into the world of cybersecurity. Participants will engage in hands-on activities and challenges that will help them develop essential skills and explore potential careers in this rapidly growing field. The hackathon aims to inspire the next generation of cybersecurity experts by offering a fun and educational environment where students can learn from industry professionals and collaborate with their peers.

We are proud to have several sponsors supporting this year’s hackathon, including The Cybersecurity Center of Excellence and the Wisconsin Cyber Threat Response Alliance. Their contributions are instrumental in providing resources and expert guidance to the participants. If you are interested in volunteering or learning more about the event, please reach out to the event organizers Amy Bires, amy.bires@dpi.wi.gov or Michael Patton, pattonm@uwosh.edu. Your support will help create an unforgettable experience for these aspiring cybersecurity experts.

New Tools in Healthcare Education: Incorporating AI-Generated Simulations

Using simulation in healthcare education is nothing new, and it has proven to be a valuable way to rapidly advance the knowledge and skill of medical professionals. What is new, is the use of generative artificial intelligence to bolster educational simulations, making them more realistic, and increasingly-effective aids in healthcare education, leading to better-trained medical providers, and more effectively diagnosed and treated patients.

Seon Yoon Chung Biography
Seon Yoon Chung is an administrator, educator, researcher, nurse who is dedicated to contributing to the society by promoting health and well-being through empowering the healthcare workforce. As a Certified Healthcare Simulation Educator and certified Nurse Educator, she is a great proponent of experiential learning, leveraging state-of-the-art teaching and learning technologies, to support learners’ competency development in a psychologically safe environment.

Seon Yoon is a Dean at the University of Wisconsin Oshkosh. She holds PhD from the University of Maryland, where she also served as a faculty member prior to joining Illinois State University as an administrator, preceding her taking her current role at the University of Wisconsin Oshkosh.

Watch the TEDxOshkosh Talk here

Arctic Wolf Presents: The Biggest Breaches of 2024

For cybercriminals, 2024 was a story of evolution and adaptation. Threat actors ensured that accidental insiders paid dearly for their mistakes, infostealer malware attacks surged around the globe, unremediated vulnerabilities provided new, novel paths past defenses, and ransomware continued its reign as the cyber attack most likely to disrupt businesses and destroy reputations by making double extortion the rule, rather than the exception.

In this exclusive, interactive Biggest Breaches of 2024 resource, you can explore the nine most noteworthy data breaches of the year from all around the world, enhanced by novel insights from our elite team of security researchers, data scientists, and security development engineers.

Explore Biggest Breaches 2024 here

Enterprises are doubling down on IT optimization strategies – and it’s delivering huge financial returns

 

Organizations that share seven key attributes see significantly better return on investment

Organizations are doubling down on IT optimization strategies, and the results are paying off in a big way. A recent study reveals that enterprises investing in streamlined IT operations, automation, and cloud efficiency are seeing significant cost savings and improved business performance.

Key findings highlight that businesses prioritizing IT modernization are not only reducing operational costs but also enhancing security, boosting productivity, and accelerating innovation. With the rapid pace of digital transformation, IT leaders are focusing on strategies that drive long-term value, ensuring their technology investments align with business goals.

As enterprises continue refining their IT infrastructures, the financial returns demonstrate that optimization is more than just a cost-cutting measure—it’s a strategic advantage.

Read full article here