Our Technology Risk Management Director, Lou Romero developed a quarterly “Tech Watch” newsletter for all BURLCO JIF members. It provides details on today’s cybersecurity risk environment with an overview of current vulnerabilities, threats, and the impact of various cybersecurity issues. Click on the picture to view and download the full newsletter. Contact Lou directly (732) 690-4057 or Lromero@SecureDataCS.com for more information.
opens in a new window
Phishing attempts are increasing in frequency and becoming harder to spot. Don’t get hooked! Click on the pic to download our “10 Tips for Detecting Phishing Emails” poster or contact Megan Matro (firstname.lastname@example.org) for additional copies to hang in your municipal offices.
Controlling technology risks in your municipality has never been more important. As cyber thieves grow smarter, municipalities must be vigilant in protecting their town’s computer systems from costly attacks, crippling damage or unauthorized access. Cyber security is a worthwhile investment AND an ongoing process. Click on the links below to discover tools and resources to help keep your systems secure.
- opens in a new windowTechnology Risks in Municipal Government
- opens in a new window3 Ways to Avoid Phishing Attacks
- opens in a new windowMEL Video on Cyber Security
- opens in a new windowListen to PRIMA’s Cybersecurity: Trends & Threats Podcast
- opens in a new windowFBI.gov: Protecting Yourself Online in an Interconnected World
- opens in a new windowNew Jersey Cybersecurity & Communications Integration Cell (NJCCIC)
- opens in a new windowRemote Access: Open Ports Create Targets of Opportunity, Undue Risk
- opens in a new windowNJCCIC Cyber Tip of the Day
- opens in a new windowPivot Point Security: 4 Critical Cyber Security Recommendations for Municipal Governments that Outsource IT
- opens in a new windowPivot Point Security: 3 Moves to Make When Malware Comes from a Trusted Source
- opens in a new windowDepartment of Homeland Security: Stop.Think.Connect…Government Resources
And opens in a new windowwatch a video HERE to learn how simple it is for thieves to hack into accounts though “social engineering” and gain access to your personal information.