Use these best practices to strengthen your cybersecurity action plan and help ensure your municipality isn’t the next cybercrime victim
Today’s tech-savvy world may seem to make life a whole lot easier, but for some, that can change in a split second. Cybercrimes have become a reoccurring issue for municipalities both small and large, and as technology continues to grow and develop, you can guarantee that new cybercrime tactics will follow suit.
Earlier this year, the city of Baltimore’s servers were breached causing the city’s emails, a credit card payment system and real estate transactions to come to a halt. To make matters worse, the hackers demanded 13 bitcoins, roughly equivalent to a hefty $100,000 today, to get things back up and running. Although the ransom wasn’t paid, the city’s budget office estimated $18 million in recovery costs.
Municipalities collect and store highly confidential information for their community members, making them perfect victims for cybercriminals. How can you best outsmart these hackers? Education and communication. The more informed your community members are of cybercriminals and their tactics, the harder it will be for these hackers to infiltrate. A great first step is to understand and communicate common red flags:
4 TIPS TO IDENTIFY PHISHING EMAILS
- Unknown email sender
- Email requests personal or financial information
- Email wants the recipient to respond immediately or makes an urgent request for information (lookout for upsetting or exciting statements asking you to act fast)
- Emails wanting the recipient to open an attachment or click a link unexpectedly (hover the mouse over the link to see what website appears)
These are just a few red flags to look out for, but as time goes on, new cybercrime tactics will surely develop. Stay informed of new strategies and keep your team in the loop. As you continue to perform your everyday functions keep these cybersecurity tips top-of-mind:
10 CYBERSECURITY TIPS TO SAFEGUARD SENSITIVE DATA
- Keep only what you need. Reduce the amount of collected and stored information to what is absolutely necessary.
- Safeguard data. Lock physical records in a secure location and restrict access to employees who need to retrieve this private data.
- Destroy before disposal. Before disposal, shred paper files of private information and destroy CDs, DVDs and other portable media.
- Update procedures. Refrain from using Social Security numbers as employee IDs or client account numbers.
- Train employees. Educate employees on what information is sensitive and their responsibilities for protecting the data. A written policy on privacy and data security should be established and communicated to all.
- Control computer use. Employee use of computers should be strictly used for business. Consider blocking access to certain sites and unapproved software.
- Secure all computers. Never leave laptops and computers unattended and enforce password protection calling for re-logon after a period of inactivity.
- Keep security software up-to-date. Security patches for computers should remain up-to-date and default settings should be applied on new servers.
- Encrypt data transmission. Consider data encryptions and try to avoid using Wi-Fi networks as they can allow for data interception.
- Manage portable media usage. DVDs, CDs and flash drives can be lost or stolen. If storing sensitive data on laptops, consider encrypting them.
One cyberbreach can not only cost your municipality millions, but it can also lead to a disruption of operations and a loss of community trust. Don’t take the risk; establish a formal action plan using the above tips to better protect your community members, finances and reputation.
DISCLAIMER
The information contained in this blog post is intended for educational purposes only and is not intended to replace expert advice in connection with the topics presented. Glatfelter specifically disclaims any liability for any act or omission by any person or entity in connection with the preparation, use or implementation of plans, principles, concepts or information contained in this publication.
Glatfelter does not make any representation or warranty, expressed or implied, with respect to the results obtained by the use, adherence or implementation of the material contained in this publication. The implementation of the plans, principles, concepts or materials contained in this publication is not a guarantee that you will achieve a certain desired result. It is strongly recommended that you consult with a professional advisor, architect or other expert prior to the implementation of plans, principles, concepts or materials contained in this publication.
This blog post may contain the content of third parties and links to third party websites. Third party content and websites are owned and operated by an independent party over which Glatfelter has no control. Glatfelter makes no representation, warranty, or guarantee as to the accuracy, completeness, timeliness or reliability of any third party content. References to third party services, processes, products, or other information does not constitute or imply any endorsement, sponsorship or recommendation by Glatfelter, unless expressly stated otherwise.
Related posts
Keep these tips in mind to help your water facility minimize the damage and disruption a hurricane could cause.
How you can help protect your most important asset: your people, and how to help them set up their insurance benefits so that they reflect their wishes.
Consider these best practices to avoid significant property damage, costly repairs and potential interruptions to your operations due to pipe freezing.
Submit a Comment