Cybersecurity
-
At least three states have taken action following the cyber attack, which exposed sensitive personal and medical information. Hackers accessed a company network during a nearly three-month period.
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
-
The city currently cannot process some online credit card payments, because of a cyber attack on one of its payment gateway providers. Officials are working to stand up a secure alternative solution.
More Stories
-
"Governor Spitzer's plan to give drivers licenses to illegal aliens has incensed New Yorkers in every part of the state and every political party because they see the threat it would pose to public safety and security."
-
The annual value of international physical trade in counterfeited consumer goods in 2007 totaled an estimated $200 billion, an amount equivalent to 2 percent of world trade and higher than the GDP of 150 countries.
-
"We will be incorporating all of these security standards into our past, present and future interoperability specifications."
-
"Should an Internet or network disruption take place, it is essential that we have effective and well-coordinated processes in place."
-
The NASCIO Member told congressional subcommittee: "should an Internet or network disruption take place, it is essential that we have effective and well-coordinated processes in place to ensure successful and rapid restoration of critical IT systems and applications as well as the Internet."
-
"Deploying video cameras as part of our overall crime-fighting strategy is a great example of using modern technology to enhance public safety and improve services to our citizens."
-
Guide outlines a top-level process for building and implementing a technically sound and effective information security program within an organization.
-
Includes the CIO's Top 10 List, technology issues, the promise of XML, the necessary link to enterprise architecture, and managing digital assets.
-
"While the Internet has opened a wonderful world of opportunities and information, it also can be dangerous. The safety of our children is paramount and it is important for state officials, community leaders ... to come together to provide parents with the best possible information on how to protect their children."
-
-
Photo identification is not required when voting by mail.
-
"For security reasons we cannot tell you how many cameras we'll be purchasing, or exactly where we'll be installing them, but rest assured the money will go a very long way in making our riders even safer than they are today."
-
"The gang responsible are experts at choosing topical disguises or crafting alluring e-mails that the unwary may find difficult to resist."
-
"This Trojan exploits the vulnerability within the person sitting in front of the keyboard. It's the Mac user who is giving permission for the code to run and allowing their computer to be infected."
-
Would function much like the national "Do Not Call" list, and is intended to protect consumers from having their online activities unknowingly tracked, stored, and used by marketers and advertising networks.
-
"Most identity theft measures are aimed at punishing criminals or helping victims recover. A credit freeze can stop ID theft before it happens."
-
"People should exercise caution when they receive unsolicited e-mail or e-mail from senders they don't know. They should avoid opening any attachments or clicking on any links until they can verify the e-mail's legitimacy."
-
"This training was an opportunity for law enforcement to learn about how digital evidence is created and can be found. This was a great first step in providing law enforcement with training so that it can take advantage of the latest technologies to prevent and investigate a broad range of crimes."
Most Read