Page 7 - Binder1- Fall 2019
P. 7

7





 Cyber-security- Protecting Your Citizens






         Sperlman said to have a                  LARM members need to
         comprehensive computer                   submit information to LARM          sensitive information be
         policy in place and                      about their current office            altered, corrupted,
         enforced. Policies included              computer cyber safety               destroyed, or deleted,
                                                                                      credit card and social
         should be that the work                  policies including whether          security number
         password should never be                 they have a privacy policy,         information from citizens
         used outside of work.                    if they store credit card           can be taken. An
         Care should be taken with
         C                                        i                                   i
                                                  innformation, if they back up
                                                                                      inadnadvertent click on a web
         work phones and work                     and encrypt sensitive               page may be all that it
         computers used off site as                information, whether                takes for a system to
         stolen and lost phones and               they’ve had a breach to             become unusable,” Bos said.
         laptops provide an easy                  their computer system in            Nebraska Homeland
         method for hackers to copy               the past, and if they               Security provides
         and use your data.                       regularly update their              Community Cybersecurity
         “                                        c                                   Exercise Planning for
         “Phishing emails try to trap
                                                  computer software.
         you into giving out bank                 It is vital that staff establish     community representatives.
         numbers or other sensitive               basic computer security             For more information go to
         information. They are able               habits.                             nema.nebraska.gov.
         to spoof someon else’s                   “There are a variety of risk        M
                                                                                      More information on
         email,” Sperlman said.                   exposures a government              reducing your
         H                                        entity has that comes with          cyber-security threat can
         He emphasie emphasized the
         importance of backing up                 using computers, email and          abe found at
         computer data and then                   the Internet. An employee           https://www.cisecurity.org/.
         testing it to make sure it is            may bring a virus infected
         viable.                                  thumb drive to work that
         “Make sure you have a                    i
         “
                                                  innfects all of the office
         backup for at least the                  computers. Because of that
         last six weeks on a                      breach, not only can
         different network and then
         test it.”


                    “Our daily life, economic vitality, and national security

                        depend on a stable, safe, and resilient cyberspace.”

                    U.S. Department of Homeland Security






 Protect your home and/or business WiFi


 network.                                                                 Photo taken in downtown Oshkosh NE
   2   3   4   5   6   7   8   9   10   11   12