Secure Jeffco

The Chief Security Information Officer at Jefferson County brings you important information about the latest cyber security threats, scams and tips on how to avoid being a victim.

Mission

Appropriately safeguarding Jefferson County business operations by understanding and aligning security initiatives with risk.

Policies

Report a Cyber Security Concern

Do you have a cyber security concern? View our Cyber Security Concern page to learn more about the places to which you can report what you feel may be a threat or cyber security concern.

  1. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    How Many Times Has Your Information Been Exposed?

    With yet another large breach being reported, the Marriott breach, you may be wondering if your personal information has been exposed to hackers. Read on...
  2. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    Staying Secure While Shopping Online

    Though it can be convenient to avoid the lines and rush for that latest Black Friday deal by shopping online, this also carries some risk. Read on...
  3. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    Kids Safe Online Poster Contest

    October kicks-off a national "Kids Safe Online" poster contest. The contest runs through 1/25/19. Read on...
  4. Grahpic of Cyber Security images such as locks, email, hackers, security breaches

    Replace passwords with passphrases

    Learn how to create strong passwords, called passphrases, that are easy to remember and simple to type. Read on...
  5. cyber-security-lock-news

    Phone Call Attacks and Scams

    When you think of cyber criminals, you probably think of an evil mastermind sitting behind a computer launching sophisticated attacks over the Internet. Read on...
  6. cyber-security-lock-news

    Reports of Spoofed Robocalls from Jefferson County Offices

    Spoofing is a practice of deliberately falsifying telephone number to disguise the identity of the calling party. Read on...
View All News

SANS - Information Security RSS Feed

  1. Securely Disposing Mobile Devices

    Do you plan on giving away or selling one of your older mobile devices? Make sure you wipe or reset your device before disposing of it. If you don't, the next person who owns it will have access to all of your accounts and personal information.

    meetings and agendas 2
  2. Trust Your Instincts

    Ultimately, common sense is your best protection. If an email, phone call or online message seems odd, suspicious or too good to be true, it may be an attack.

    meetings and agendas 2
  3. When Away

    Leaving your seat? Ctrl--Alt--Delete! Make sure you lock your workstation or laptop while you are away from it. On a Mac? Try Control--Shift--Eject/Power.

    meetings and agendas 2
View All