Cyber Security

 

Cyber security, computer security or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

Information Security Resources
Multi-State Information Sharing and Analysis CenterMulti-State Information Sharing and Analysis Center
The mission of the MS-ISAC is to improve the overall cybersecurity posture of U.S. State, Local, Tribal and Territorial (SLTT) government organizations through coordination, collaboration and cooperation, and increased communication....Read more
Why You Should Avoid Using Public WiFiWhy You Should Avoid Using Public WiFi
Wi-Fi users are at risk from hackers but fortunately, there are safeguards against them. The recent explosion of free public Wi-Fi has been an enormous boon for working professionals....Read more
HOW TO PREVENT SOCIAL ENGINEERING ATTACKSHOW TO PREVENT SOCIAL ENGINEERING ATTACKS
When we think about cyber-security, most of us think about defending ourselves against hackers who use technological weaknesses to attack data networks. But there is another way into organizations and networks, and that's taking advantage of human weakness. ...Read more
Protect Your DataProtect Your Data
Wireless providers and the broader wireless ecosystem work relentlessly to protect networks and devices and to stay ahead of constantly evolving cyber dangers. ...Read more
Secure Your ComputerSecure Your Computer
Keeping your computer secure helps you avoid malware and direct hacking attempts designed to steal your personal information. Here are some ways you can help reduce your online risk when you use your computer at home....Read more
Red Herring BrochureRed Herring Brochure
RedHerring is a Phishing awareness product developed by the San Diego County Office of Education (SDCOE) with school district employees in mind. Phishing has become a huge issue in the recent years having shot up almost 600% since the start of the pandemic in 2020....Read more
External Resources

FBI Cyber Threat

Malicious cyber activity threatens the public’s safety and our national and economic security. Our goal is to change the behavior of criminals and nation-states who believe they can compromise U.S. networks, steal financial and intellectual property, and put critical infrastructure at risk without facing risk themselves.


Safer Connected World

 - Develop, validate, and promote timely best practice solutions that help people, businesses, and governments protect themselves against pervasive cyber threats.

 

Cyberattacks Protection

Cyberattacks can lead to the loss of money or the theft of personal, financial and medical information. These attacks can damage your reputation and safety.


Government Update

Regardless of size, CISA recommends all organizations adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets.


NIST Standards

NIST develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of U.S. industry, federal agencies and the broader public.


Nation State Cyber Threats

CISA leads the Nation’s strategic and unified work to strengthen the security, resilience, and workforce of the cyber ecosystem to protect critical services and American way of life.


Security Guru

Hackers have launched a successful cyberattack against schools across the UK and has left confidential information related to pupils leaked online. In total, 14 schools have been impacted, with the sensitive data stolen including passport details, which were likely needed for trips abroad, as well as contracts and pay scales for members of staff.


Critical Controls

Over the years, many security standards and requirements frameworks have been developed in attempts to address risks to enterprise systems and the critical data in them. However, most of these efforts have essentially become exercises in reporting on compliance and have diverted security program resources from the constantly evolving attacks that must be addressed.