Cybersecurity
-
At least three states have taken action following the cyber attack, which exposed sensitive personal and medical information. Hackers accessed a company network during a nearly three-month period.
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
-
The city currently cannot process some online credit card payments, because of a cyber attack on one of its payment gateway providers. Officials are working to stand up a secure alternative solution.
More Stories
-
"Be mindful that criminals are actively looking for identity theft opportunities this time of the year."
-
Currently implementing agencywide smart-card logon with Personal Identification Verification (PIV) certificates; secure e-mail via standards-based encryption capabilities; digital signatures for agency forms and documents; and strong authentication solutions for Web servers and domain controllers.
-
"Help the legitimate traveler proceed more quickly while protecting their identity and enable our frontline personnel to focus even greater attention on potential security risks."-Dept. of Homeland Security Secretary Michael Chertoff
-
Plan will consolidate IT functions including management of private sector contracts and infrastructure security.
-
CyberLover malware mimics males and female to steal personal data.
-
Training program for junior high and high school personnel will demonstrate what cyberbullying is, how it happens and how educators can recognize signs and take action to thwart this practice.
-
Addressing the need to adopt new practices that protect Social Security numbers and other personal information from identity thieves and other unscrupulous viewers while maintaining records that can be used for legitimate business purposes.
-
A "roadblock" between the public and critical government information.
-
Reports says action must be taken to protect organizations from cyber attacks.
-
Bill requires sex offenders to register e-mail addresses; increases penalties for using technology to lure children.
-
Spammers increased usage of attachments, such as PDF files in 2007.
-
Hard disk containing personal information missing from "secure facility" in America.
-
Fifty-three percent of adult Internet users say they have searched online for family and friends, romantic interests or business colleagues.
-
"To put it in every-day terms, the tools needed to compromise an accurate vote count could be as simple as tampering with the paper audit trail connector or using a magnet and a personal digital assistant."
-
DHS hopes Ill. will amend statute which forbids Illinois employers from enrolling in DHS's E-Verify system.
-
"If I'm too lenient in determining what passes then I risk having the state taken to court by activists groups who will ask for an injunction on the use of electronic voting machines for the 2008 election, and if I exceed the requirements of state law and the court order, then I will be sued by the vendors who manufacture and sell the equipment."
-
-
Personal information, including Social Security numbers, not appropriately secured.
Most Read
- Ohio Communities Grapple With Data Center Approval Decisions
- Why a Connecticut Town Voted to Turn Off License Plate Readers
- ‘Part of Your Arm’: Students Say Tech Prohibitions Miss the Point
- Bright Spots Remain Amid Drop in Electric Truck Deployments
- Wyoming CIO Jeff Clines Is Upgrading Processes and Trust