Secure Jeffco

The Chief Information Security Officer at Jefferson County brings you important information about the latest cyber security threats, scams and tips on how to avoid being a victim.


The mission of the cyber security program is appropriately safeguarding Jefferson County business operations by understanding and aligning security initiatives with risk.

Read the full Secure Jeffco strategic plan here.


Report a Cyber Security Concern

Do you have a cyber security concern? View our Cyber Security Concern page to learn more about the places to which you can report what you feel may be a threat or cyber security concern.

  1. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    Social Media Privacy Settings

    January 28th is Privacy Day in 2021, but everyday we should be aware of how the information we make available online could be used to target us. Read on...
  2. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    Unemployment Fraud

    Unfortunately, with the rise in unemployment insurance claims associated with COVID-19, there has also been a rise in fraudulent claims and other instances of fraud. Read on...
View All News

SANS - Information Security RSS Feed

  1. Scamming Your Through Social Media

    You may be aware that cyber attacks will try to trick you over the phone or through email using phishing attacks, but do you realize they may try to attack you also over Social Media, such as through Snapchat, Twitter, Facebook or LinkedIn? Just...

    meetings and agendas 2
  2. Never Respond to Emails Asking for Personal Information

    Companies you do business with should never ask for your account information, credit card numbers or password in an email. If you have any questions about an email you receive that supposedly came from your financial institution or service provider...

    meetings and agendas 2
  3. Phishing

    Phishing is when an attacker attempts to fool you into clicking on a malicious link or opening an attachment in an email. Be suspicious of any email or online message that creates a strong sense of urgency, has bad spelling or addresses you as...

    meetings and agendas 2
View All