Cybersecurity
-
A faux-phishing email crafted by students at Eminence High School in Kentucky snagged 14 staffers at the district. Another in late January, created with help from generative AI, persuaded 29 staffers to click the link.
-
At least three states have taken action following the cyber attack, which exposed sensitive personal and medical information. Hackers accessed a company network during a nearly three-month period.
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
More Stories
-
Federally supported online system will allow agencies to verify information provided by employees at no cost.
-
Will provide the state with the ability to store and back up data for all state agencies in the case of a natural disaster or homeland security threat
-
Monitors alcohol consumption by analysis of the emissions from the wearer's sweat glands
-
"Giving them online access to records means we do not have personnel tied up on those inquiries"
-
Identity theft does not always involve the Web
-
"Federal leaders have a responsibility to work with states and fund this mandate"
-
Traditional software applications may cost more than deploying a software-as-a-service model
-
Thousands in Australia affected, malicious eGreetings now being spammed around the world
-
"Understanding the current threat landscape is critical in helping us protect our citizens' online interactions"
-
Agencies can develop solid foundation for migration plans
-
-
"These important new laws are yet another step towards ensuring ... consumers do not fall victim to identity theft"
-
"People sit in Internet cafes in Lagos and send e-mails all day. They have no money, and they can make thousands of dollars"
-
"The trend has clearly begun to change"
-
"Phisher sites are a dangerous and fast-growing type of identity theft"
-
"We have 37 parishes that are using the new system for the first time and we will have support staff either on site or in the near vicinity"
-
Stolen, unsecured laptops and all mobile devices will continue to pose threat until more companies take action
-
"As long as the right processes and policies are also in place, any technology can be part of a secure solution"
Most Read
- Florida Legislature Advances 'AI Bill of Rights' for K-12
- ‘Firenadoes’ Spotted Amid Wildfires in Kansas, Oklahoma
- UNC Greensboro, Guilford County Schools Partner for Tech Education
- Ohio Communities Grapple With Data Center Approval Decisions
- Why a Connecticut Town Voted to Turn Off License Plate Readers