Cybersecurity
-
After a phishing incident in December initially cost Warren County over $3.3 million, officials may soon pass a thorough computer use policy for county employees that will touch on related issues.
-
Funding from the federal State and Local Cybersecurity Grant Program will support the delivery of multifactor authentication hard tokens to 161 local governments in New York state.
-
The auditor’s budget was cut after its refusal to join a countywide cyber program and contribute $1 million from its real estate assessment fund to help mitigate the cybersecurity costs.
More Stories
-
Over 1.3 billion Radio Frequency Identification (RFID) tags were produced in 2005, and by 2010, that figure will soar to 33 billion, reports In-Stat
-
The action is part of an effort to revive an Internet child protection law that was struck down two years ago by the U.S. Supreme Court
-
Including a GPS survey to create a base map of more than 77,000 miles of roads in 120 counties with a spatial accuracy of two meters
-
The Federal Trade Commission yesterday reiterated that despite the claims made in e-mails circulating on the Internet, consumers should not be concerned that their cell phone numbers will be released to telemarketers in the near future, and that it is not necessary to register cell phone numbers on the National Do Not Call (DNC) Registry to be protected from most telemarketing calls to cell phones
-
The FBI recently released results from its 2005 FBI Computer Crime Survey, its largest survey on issues of this kind
-
Callers request personal and bank account information in order to receive the offer
-
The registry is designed to help parents and others guard children from inappropriate messages
-
"The state of Michigan must send a clear message that the private, personal information of Michigan consumers is not a commodity and is not for sale"
-
"Too much is at stake to risk being caught unprepared"
-
Survey reveals Internet user's top concerns: viruses and identity theft
-
The program examines records management in relation to the business needs of all types of organizations both in the public and private sector, embracing all records but with a particular emphasis on electronic records
-
"One of the linchpins is to get cybersecurity included in the DHS's state homeland security assessment and strategy process, which is the national protocol that drives state homeland security spending. Currently, that process excludes cybersecurity entirely, so we weren't surprised to find most states' overall preparedness to be seriously lacking"
-
DHS "falling short in fulfilling its basic obligations to state and local governments" says Thompson
-
"The prototype not only served as a proof of concept, it is also already saving the Internet Unit an estimated five hours per week"
-
"Not only did this product fail to detect and remove spyware on the consumer's computer, it actually tampered with security settings to make the machine even more vulnerable"
-
Users included fashion moguls like Ralph Lauren and Calvin Klein, the sports-related Lance Armstrong Foundation and entertainment figures such as newscaster Larry King and actor Morgan Freeman
-
NIST standards and guidelines needed for FISMA compliance
-
A federal district court in Nevada has ruled that Google does not violate copyright law when it copies websites, stores the copies, and transmits them to Internet users as part of its Google Cache feature