Law Enforcement Ransomware Mitigation Guide

This NJCCIC Advisory: Law Enforcement Ransomware Mitigation Guide  is being provided to aid our law enforcement partners throughout the State in mitigating the risks associated with ransomware infections. Ransomware is a type of malicious software that requires the victim to pay a ransom to access encrypted files. Numerous police departments throughout the State of New Jersey have been victimized by ransomware, resulting in the temporary loss of access to Record Management Systems (RMS) and Computer-Aided Dispatch (CAD) systems.

 » Read more

Gartner Survey Finds Only 65 Percent of Organizations Have a Cybersecurity Expert

Despite 95 percent of CIOs expecting cyberthreats to increase over the next three years, only 65 percent of their organizations currently have a cybersecurity expert, according to a survey from Gartner, Inc. The survey also reveals that skills challenges continue to plague organizations that undergo digitalization, with digital security staffing shortages considered a top inhibitor to innovation.

Click here for original article.

 » Read more

Privacy Questions Raised as Tech Giants Join Forces on Data Portability

Security researchers have concerns about the privacy implications of Google, Facebook, Microsoft and Twitter’s Data Transfer Project.

A veritable who’s who of tech giants from Google, Facebook, Microsoft and Twitter, went public last week with a partnership on a standards initiative called the Data Transfer Project (DTP), built to enable data portability between cloud platforms. But security researchers believe the project’s privacy implications need to be better vetted.

Click here for the original article.

 » Read more

Coming Out of the Dark

The modern, digitally connected world has created enormous benefits for individual’s business and personal lives. People have the opportunity to connect for commercial and social reasons more easily than in other time in human history. However, the advancements in technology have not been wholly positive. The development of consumer encryption, both on mobile devices and data in transit from “apps”; the dark web; and cryptocurrencies, to name just a few technologies, have created a situation where sophisticated criminals who are abusing children,

 » Read more

IACP Conference