Secure Jeffco

The Chief Information Security Officer at Jefferson County brings you important information about the latest cyber security threats, scams and tips on how to avoid being a victim.

Mission

The mission of the cyber security program is appropriately safeguarding Jefferson County business operations by understanding and aligning security initiatives with risk.

Read the full Secure Jeffco strategic plan here.

Policies

Report a Cyber Security Concern

Do you have a cyber security concern? View our Cyber Security Concern page to learn more about the places to which you can report what you feel may be a threat or cyber security concern.

  1. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    Use Zoom with Caution

    While we are all focused on social distancing, many of us working remotely still have a need to meet with groups of people. Read on...
  2. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    Covid-Related Attacks

    As many of us are working remotely and our children are being educated at home -- and there is increasing anxiety related to Covid, we are seeing more attackers attempting to take advantage. Read on...
  3. news_family-using-tablet

    Steps to Securely Work from Home

    In response to COVID-19, organizations worldwide are implementing work-from-home policies. For many, a remote workforce is new which means a lack of processes and technologies to secure employees at home. Read on...
  4. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    Protect Your Business from Malicious Email

    Email is one of the primary mechanisms attackers use for their nefarious deeds. If your organization runs an email server, read more about this online bootcamp to train your IT staff to implement email security. Read on...
  5. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    Digital Spring Cleaning

    Time to spring clean your digital space. Read on...
  6. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    New Year, New You...Same W-2 Tax Scam

    Criminals will go to great lengths to separate you from your money, your identity, or anything of value that is within their reach. Read on...
View All News

SANS - Information Security RSS Feed

  1. Secure Your Home Wi-Fi Network

    Be aware of all the devices connected to your home network, including baby monitors, gaming consoles, TVs, appliances or even your car. Ensure all those devices are protected by a strong password and/or are running the latest version of their...

    meetings and agendas 2
  2. Search Yourself Online

    Ever wonder just how much information is publicly available about you? Ever wonder how cyber criminals harvest information and customize attacks for their victims. The technique is called Open Source Intelligence (OSINT) and it is far simpler and...

    meetings and agendas 2
  3. Personalized Scams

    Cyber criminals now have a wealth of information on almost all of us. With so many hacked organizations now a days, cyber criminals simply purchase databases with personal information on millions of people, then use that information to customize...

    meetings and agendas 2
View All