A recent survey by the Center for Digital Government showed that the top priority for city and county CIOs is Cyber Security, which ranks higher than Broadband & Connectivity, and Citizen Engagement. While I am pleased to know that most local CIOs are focused on the issue of cyber security, it does surprise me that […]
Trust but Verify Emails
When you receive emails from someone you know or an organization with whom you have been doing business, your defenses are usually lower. You have known this person for a long time, or you have been dealing with that company for years. Maybe it is a brand that elicits trust…Microsoft, Amazon, Apple, Verizon, etc. However, […]
Beware! Vishing Scams Coming to a Phone Near You
Vishing is a voice phishing scam, also known as a phone-based phishing attack. The criminal will call the intended target and try to persuade them to take action, thereby scamming them out of money or access. The caller will make the request seem urgent and impersonate a financial institution, the IRS, or a utility company. […]
Cyber Scams CAN happen to you! Are you prepared?
I am always warning people about cyber scams. I am what some might call a cybervangelist. Whether through phishing (emails), smishing (text messages), or vishing (voice). Last week, someone tried one of those cyber scams on me. I received a call that appeared to be from Louisville Gas & Electric (LG&E), my local utility company. […]
Cyber Security Funds Available for Local Government
The landmark $1.2 Trillion Infrastructure Investment and Jobs Act that was signed into law has several very important elements for state and local officials. As the federal government has grappled with its own cyber security attacks which are growing seemingly exponentially, the emphasis on cyber security for all public and private entities is evident. One […]
Is Your Domain Name Vulnerable to Sneaky Crooks
Your organization’s domain name is unique to your company. It correlates to your IP address and searches for your website and your employees’ emails. A cyber criminal can impersonate or infiltrate your domain to trick someone into clicking on a malicious link (also known as phishing). The following are steps you can take to protect […]






