Cybersecurity
-
As part of a 10-county pilot, the local government fully implemented the technology Jan. 29. Its GPS, GIS and improved cellphone technology offer additional accuracy during emergencies.
-
The state’s recently arrived director of cyber operations will work closely with state Chief Information Security Officer Chris Gergen to build and manage statewide cybersecurity strategy and operations.
-
After a phishing incident in December initially cost Warren County over $3.3 million, officials may soon pass a thorough computer use policy for county employees that will touch on related issues.
More Stories
-
Phishing a crime, and penalties increased for spam law violations
-
"A standardized system relying on paper ballots ... that 11 of our counties are already exclusively relying on"
-
Over 1.3 billion Radio Frequency Identification (RFID) tags were produced in 2005, and by 2010, that figure will soar to 33 billion, reports In-Stat
-
The action is part of an effort to revive an Internet child protection law that was struck down two years ago by the U.S. Supreme Court
-
Including a GPS survey to create a base map of more than 77,000 miles of roads in 120 counties with a spatial accuracy of two meters
-
The Federal Trade Commission yesterday reiterated that despite the claims made in e-mails circulating on the Internet, consumers should not be concerned that their cell phone numbers will be released to telemarketers in the near future, and that it is not necessary to register cell phone numbers on the National Do Not Call (DNC) Registry to be protected from most telemarketing calls to cell phones
-
The FBI recently released results from its 2005 FBI Computer Crime Survey, its largest survey on issues of this kind
-
Callers request personal and bank account information in order to receive the offer
-
The registry is designed to help parents and others guard children from inappropriate messages
-
"The state of Michigan must send a clear message that the private, personal information of Michigan consumers is not a commodity and is not for sale"
-
"Too much is at stake to risk being caught unprepared"
-
Survey reveals Internet user's top concerns: viruses and identity theft
-
The program examines records management in relation to the business needs of all types of organizations both in the public and private sector, embracing all records but with a particular emphasis on electronic records
-
DHS "falling short in fulfilling its basic obligations to state and local governments" says Thompson
-
"One of the linchpins is to get cybersecurity included in the DHS's state homeland security assessment and strategy process, which is the national protocol that drives state homeland security spending. Currently, that process excludes cybersecurity entirely, so we weren't surprised to find most states' overall preparedness to be seriously lacking"
-
"The prototype not only served as a proof of concept, it is also already saving the Internet Unit an estimated five hours per week"
-
"Not only did this product fail to detect and remove spyware on the consumer's computer, it actually tampered with security settings to make the machine even more vulnerable"
-
Users included fashion moguls like Ralph Lauren and Calvin Klein, the sports-related Lance Armstrong Foundation and entertainment figures such as newscaster Larry King and actor Morgan Freeman