Security cameras

06 Dec: Beware the Security Risks of “Free” Websites

Reading Time: 4 minutes Today, there are so many free website and content management system platforms that you can set up in a short time. Because the cost is so compelling, many smaller organizations, businesses, and even cities go this route to set up a very low-cost website. If you took a low-cost approach to get your city’s website up and running, you may be at risk. To perform a quick security assessment, ask yourself 5 questions.


06 Sep: Tips on Preventing an Advanced Email Spoofing Attack: An Interview with Stephanie Settles, City Clerk and Treasurer of Paris, Kentucky

Reading Time: 5 minutes Because cities are big targets for cybercriminals, you might occasionally become the subject of a sophisticated, targeted email scam—so sophisticated that it’s really, really hard to know if the email is spam. In this interview, Stephanie Settles, City Clerk and Treasurer of Paris, Kentucky, talks to us about how she ended up detecting a complex spoof email and how cities can stay vigilant against similar attacks.

Woman at computer

30 May: 7 Reasons City Employees Should Not Use Unapproved Software

Reading Time: 4 minutes Big problems can occur when government employees download software outside of IT policy. While downloading such software may be fine at the employee’s home, remember that you’re an important government entity — a municipality that needs to protect critical citizen information and comply with important laws. Our post provides 7 questions you need to ask about the software your city employees use.


20 Oct: Ways to Lock Down and Prevent Unauthorized Physical Access to Technology

Reading Time: 3 minutes Any city—even a smaller city—needs physical security for its onsite technology. Don’t make it too easy for a disgruntled employee or member of the public to damage or access information from a server or computer. Your liability greatly increases when you lack good physical security for your technology. So what do you need to do? Physically lock down and prevent unauthorized access to your technology through the following best practices.