Cybersecurity
-
The incident, described as an “attempted interruption,” prompted staffers to work manually, and led to the cancellation of a City Council meeting. Water, sewer and tax payments are also disrupted.
-
The move places the state among a growing group of governments using the shared authorization framework to reduce duplicative vendor security assessments. GovRAMP evolved from StateRAMP last year.
-
A faux-phishing email crafted by students at Eminence High School in Kentucky snagged 14 staffers at the district. Another in late January, created with help from generative AI, persuaded 29 staffers to click the link.
More Stories
-
-
"This Task Force has an important and serious mission... keep children safe online"
-
"It's crucial that shoppers are able to pick out the red flags that can tip them off to a potential scam"
-
Children across Northern Ireland to be shown how to use virtual police presence in new crackdown on child sex abuse
-
May include charges for voice mail, web-related services, Internet Yellow Page listings or directory assistance
-
-
"Consumers should be alarmed whenever unsolicited e-mails ask them to divulge personal or financial information"
-
"The strategies presented in the paper are recommended practices that have been successfully implemented by a number of states and could likely be adopted by other states interested in pursuing digital archiving initiatives"
-
"My goal is to continue to reach as many youth as possible"
-
Too few policies in place to protect mobile device content for compliance and security purposes
-
The contract -- which runs for seven years with three one-year extensions -- will consolidate the state's 31 data centers into two
-
"I applaud the investigative work of our Internet Cyber Crimes Task Force"
-
"Move away from traditional, point solutions, and evolve towards security platforms"
-
Promoters of Spyware Slayer accused of violating spyware and consumer protection laws
-
The three Vista-resistant threats comprise 39.7 percent of all malware currently circulating
-
"As we see sophisticated techniques on the rise, it's becoming increasingly hard for the general user base to identify or avoid malware infections"
-
One new target for e-discovery is metadata, the electronic history of any particular document. Experts can easily retrieve earlier deletions and revisions
-
Steps to take if personal information has been breached