Secure Jeffco

The Chief Information Security Officer at Jefferson County brings you important information about the latest cyber security threats, scams and tips on how to avoid being a victim.


The mission of the cyber security program is appropriately safeguarding Jefferson County business operations by understanding and aligning security initiatives with risk.

Read the full Secure Jeffco strategic plan here.


Report a Cyber Security Concern

Do you have a cyber security concern? View our Cyber Security Concern page to learn more about the places to which you can report what you feel may be a threat or cyber security concern.

  1. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    Online Security for Kids

    Kids' lives are online more than ever, from socializing with friends and interacting with family to online learning and education. Read on...
  2. header_general

    Protecting Sensitive Information

    In this article, we share our Top 5 recommendations to help you protect your sensitive information. Please note #4 - The Sheriff's Office is hosting a Shred-A-Thon on October 3, 2020. Read on...
  3. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    COVID Relief Phishing Emails Spoof SBA

    Emails that appear to be from the Small Business Administration are being sent to business owners, CEOs and CFOs, enticing them to download malware and hand over personal banking information Read on...
View All News

SANS - Information Security RSS Feed

  1. Scamming Your Through Social Media

    You may be aware that cyber attacks will try to trick you over the phone or through email using phishing attacks, but do you realize they may try to attack you also over Social Media, such as through Snapchat, Twitter, Facebook or LinkedIn? Just...

    meetings and agendas 2
  2. Updating Plugins

    Every plugin or add-on you install in your browser can expose you to more danger. Only install the plugins you need and make sure they are always current. If you no longer need a plugin, disable or remove it from your browser via your browser's...

    meetings and agendas 2
  3. Lock Your Mobile Devices

    The number one step for protecting your mobile device is making sure it has a strong screenlock on it so only you can access it.

    meetings and agendas 2
View All