Protecting Yourself from Cyber Threats

While online threats are constantly evolving, many cyber criminals use variations of the same methods with cyber attacks. Specifics of these attacks may differ, but the nature of the attacks stay the same. Cyber criminals take advantage of a user’s lack of technical expertise and inherent trusting natures. By understanding these common threats and risks, we can all take steps to protect ourselves online.

October is National Cyber Security Awareness Month (NCSAM) and the LECC is joining with the Department of Homeland Security and its partners across the country to highlight the importance of cybersecurity and online safety.

 » Read more

Cybersecurity Tips to Share

Use the tips below in a variety of NCSAM communications:

  • Set strong passwords. Make them long and complex, change them regularly, and don’t share them with anyone.
  • Secure your most sensitive accounts. When it is available, use multi-factor authentication to keep your accounts more secure.
  • Keep a Clean Machine. Keep your operating system, browser, and other critical software optimized by installing updates regularly.
  • Maintain an open dialogue.

 » Read more

2016 Deloitte-NASCIO Cybersecurity Study

Each year, the National Association of State Chief Information Officers (NASCIO) conducts a survey
of state chief information officers (CIOs) to identify and prioritize the top policy and technology
issues facing state government. State CIOs ranked cybersecurity as their top priority in 2014, 2015,
and 2016. Considering that it seems that cybersecurity breaches in both the public and private
sector are consistently splashed across the news, this is understandable.

The newly released 2016 Deloitte-NASCIO Cybersecurity Study asks state chief information security
officers (CISOs) about the status of cybersecurity in their states,

 » Read more

Understanding Digital Footprints—Steps to Protect Personal Information for law enforcement

Cybercrime is an ever-growing issue for state, local, tribal, and territorial (SLTT) law enforcement. With advancements in technology, coupled with the oversharing of personal information, law enforcement not only needs to ensure the public’s safety online but also be cognizant of the digital footprint that people are leaving behind.

This document provides material designed to assist law enforcement personnel in protecting themselves and their families from becoming cyber targets: protecting personal information, cyber dos and don’ts,

 » Read more

The Future of Cyber Investigations at the FBI Is Unclear

by Sasha Romanosky and Cortney Weinbaum

This commentary originally appeared on Inside Sources on August 24, 2016.

Judge Robert J. Bryan of the U.S. District Court for the Western District of Washington might not realize it, but his actions may affect the extent to which the FBI emphasizes the law enforcement or intelligence gathering aspects of its mission. Bryan recently excluded evidence presented by the FBI in the case of U.S.

 » Read more

Sun, Sand, and Cyber Security

By: Center for Internet Security

The Center for Internet Security (CIS) recently published their monthly Cyber Tips newsletter, Sun, Sand, and Cyber Security. This month’s newsletter focuses on securing yourself from cyber threats while on vacation this summer.

Below is the content provided in the newsletter published by CIS:

Every summer, vacationers put their house lights on timers and their mail on hold when they travel away from home.

 » Read more

Cyberbullying: What Law Enforcement Needs to Know

With the increase in cell phone and social media users in the last decade, especially young users, the opportunity for cyberbullying has also increased. According to the Bureau of Justice Statistics, 9% of children reported being cyberbullied during the 2010-2011 school year, while the Youth Risk Behavior Surveillance Survey found that 15% of high school students were bullied.

Cyberbullying can be elusive to discover as it can take place in privacy, as in the form of harassing or threatening emails or texts from an anonymous user,

 » Read more

IACP Conference

Tags