Pocatello Information Technology Department

Pocatello Information Technology Department The Pocatello Information Technology Department supports City departments with their hardware and software needs.

The Pocatello Information Technology Department supports City departments with their hardware and software needs. The City of Pocatello Social Media Terms of Use can be found at bit.ly/1l64djU

Mission: Enabling City Operations by Consistently Delivering Reliable and Secure Services, Innovative Solutions, and Best-in-Class Customer Service...A Trusted Steward of Information Technology and a Catalyst for Innovation

11 Cyber Defense Tips to Stay Secure at Work and Home
10/25/2019
11 Cyber Defense Tips to Stay Secure at Work and Home

11 Cyber Defense Tips to Stay Secure at Work and Home

11 cyber defense tips for securing your digital systems and data. From how to charge your devices safely when traveling to best practices for social.

Aligns pretty much with the CIO position in Pocatello.
06/26/2019
What Are the Most Important Traits of CIOs Today?

Aligns pretty much with the CIO position in Pocatello.

In a survey of state and local government tech executives, CIOs weigh in on the key issues they’re grappling with, how they’re handling them and what technologies will impact their operations in the…

Just a cyber reminder that everything you see on the internet is always true...
03/18/2019

Just a cyber reminder that everything you see on the internet is always true...

01/18/2019

From the desk of CIO ____________________________
In the past year, we saw a significant number of data breaches impacting the privacy of individuals. According to the Privacy Rights Clearinghouse, in 2018, 807 publicly disclosed breaches exposed 1.4 billion records. While this is a decrease from 2017’s 2 billion records exposed, the problem remains enormous because so many websites, social media outlets, and devices contain our information.

With January 28th being National Data Privacy Day, take some time to consider what types of personal information you should be protecting, and how to do so in a few different ways.

General Personally Identifiable Information
Personally identifiable information or (PII) can be any data that identifies you as a specific individual. This information should be kept private and not shared with others. Examples of PII include your Social Security Number, or your name in combination with your date or place of birth.

Recommendations: Be aware of what you post publically or submit through applications or services. Consider with whom you share your PII, and give extra scrutiny and consideration as to whether you really need to share this information. If someone contacts you requesting PII through email, social media, or a phone call, do not provide the information. If it is a phone call that you think is legitimate, hang up and call the organization back through a publicly listed telephone number so you can verify the caller is who they say they are.

Information About Your Location
Giving out your location when away from home on social media is a privacy risk. This practice can result in your home being targeted for burglary. Additionally, your family and friends may be targeted by scammers seeking financial assistance on your behalf to help with a non-existent “travel emergency.” Three popular methods of this type of location sharing are geotagging (adding a location tag to a social media post or picture), posting a photo in which the background can be easily identified (like Times Square or the Eiffel tower), or “checking in” at a business.

Allowing apps to use your phone’s location services has its own privacy concerns, as the app is likely recording or using that data, and may automatically add geotagging to social media interactions in that app as a result!
Recommendations: Customize your location settings to minimize sharing your location with websites and applications, especially on your mobile devices. You can geotag social media posts, pictures, or videos after returning from vacation, going out to eat, or that business trip. Also, check the privacy settings of apps to make sure they don’t need access to your location. At a minimum, ensure your social media settings are set to only show your posts and profile to friends.

Security Questions and Social Media
Security questions are a way to authenticate your identity and are an extra layer of security on accounts, which makes it extra important to not post these answers on social media. Posting a picture or writing a post about your first car’s make and model, or color of your car, childhood address, favorite ice cream flavor, mother’s maiden name, or elementary school is a bad idea. These are common security questions and by posting this information, you give away the answers, allowing cybercriminals to potentially access your accounts.

Recommendations: When on social media, be aware of what you post (including pictures!) and how it relates to the security questions you selected for your various accounts.

Website/Application Privacy Settings and Permission
All websites and applications have privacy settings. These settings help you control what others are allowed to see, as well as manage your online experience. You should be familiar with these privacy settings and customize them to protect your information. Additionally, when creating an account on a website or application and agreeing to their services, understand what you are giving them permission to do with the data you provide.

Take Responsibility:
Protecting your privacy starts with you. Website owners, websites, and service providers have a responsibility to protect your privacy. However, it is up to you to understand the privacy settings on social media, online accounts, and your devices. Knowing these settings, you will be able to customize them for greater security.

Take ownership of your privacy and read privacy policies and end user license agreements on websites (including social media), and update your settings whenever new privacy features are available.

For More Information:
Privacy Rights Clearinghouse
National Cybersecurity Alliance

Center for Internet Security
11/19/2018
Center for Internet Security

Center for Internet Security

It is that time of year where so many people prepare to purchase gifts for friends, family, and loved ones. Though it can be convenient to avoid the lines and rush for that latest Black Friday deal by shopping online, this also carries some risk.

Center for Internet Security
10/16/2018

Center for Internet Security

See something suspicious in your inbox? Don't open it - report it to your IT department instead. #CyberAware

Center for Internet Security
10/15/2018

Center for Internet Security

Whether you're going to get coffee or running to a meeting always make sure you lock your computer when you leave your desk. #CyberAware

STOP. THINK. CONNECT.
10/10/2018
STOP. THINK. CONNECT.

STOP. THINK. CONNECT.

We're busting some cybersecurity career myths for Week 2 of #CyberAware Month! 👊

→ You DON'T need a deep math or science background commonly associated with the cybersecurity field. Here are some tools that will help you gain a good cyber foundation.

Center for Internet Security
10/05/2018

Center for Internet Security

Make sure you always change up your #passwords when creating new accounts. Repeating passwords can leave you vulnerable. #CyberAware

STOP. THINK. CONNECT.
10/04/2018
STOP. THINK. CONNECT.

STOP. THINK. CONNECT.

What actions should you take to make your home a haven for #online safety?
🏠Start by following these tips from @McAfee_Home ↓↓↓

Center for Internet Security
10/03/2018

Center for Internet Security

Be careful when installing apps on your mobile device. Many apps want more permissions than are actually needed for their function. #CyberAware

Center for Internet Security
10/02/2018

Center for Internet Security

Do you know the difference between HTTP & HTTPS?

HTTPS is designed to better protect the integrity and confidentiality of a user's information when visiting websites. #CyberAware

Center for Internet Security
10/01/2018

Center for Internet Security

Never save passwords to any accounts on a browser. #CyberAware

Center for Internet Security
09/25/2018

Center for Internet Security

In August, malware activity decreased 20%, a change that was primarily driven by the 26% drop in the Top 10 Malware. In turn, the decline in Top 10 Malware activity is attributed to decreased Emotet (43%) and Kovter (21%) activity. https://www.cisecurity.org/blog/top-10-malware-august-2018/

Center for Internet Security
08/31/2018

Center for Internet Security

Do you periodically conduct scans on your entire computer? If not, you should be! http://ow.ly/Chk230lDvff

Center for Internet Security
05/31/2018

Center for Internet Security

Are you implementing a security awareness program in your organization? If so, follow these tips to keep employees interested. http://ow.ly/3Ets30kgZZj

Center for Internet Security
03/12/2018

Center for Internet Security

There are many free services available today. You can store pictures in the cloud, develop documents, send email, and connect with people - all without spending a dime. However, free isn't always free. http://ow.ly/9IX430iTNUS

Center for Internet Security
02/14/2018

Center for Internet Security

Heading out of town on vacation, great! Just make sure you don't share that information publicly. Learn why here: http://ow.ly/pHQT30ilMRw

Center for Internet Security
01/31/2018

Center for Internet Security

Cybersecurity Resolution # 18: Break away and have fun

Center for Internet Security
01/30/2018

Center for Internet Security

Cybersecurity Resolution # 17: Move Forward

Center for Internet Security
01/29/2018

Center for Internet Security

Cybersecurity Resolution # 16: Reflect

Center for Internet Security
01/25/2018

Center for Internet Security

Cybersecurity Resolution # 14: Build Relationships

Center for Internet Security
01/24/2018

Center for Internet Security

Cybersecurity Resolution # 13: Challenge Yourself

Center for Internet Security
01/23/2018

Center for Internet Security

Cybersecurity Resolution # 12: Conduct Vulnerability Assessments

Center for Internet Security
01/22/2018

Center for Internet Security

Cybersecurity Resolution # 11: Know Your Perimeter

Center for Internet Security
01/19/2018

Center for Internet Security

Cybersecurity Resolution # 10: Review Users’ Permission Levels

Center for Internet Security
01/18/2018

Center for Internet Security

Cybersecurity Resolution # 8: Update Network Documentation

Center for Internet Security
01/17/2018

Center for Internet Security

Cybersecurity Resolution # 7: Collaborate with IT and Dev

Center for Internet Security
01/11/2018

Center for Internet Security

Cybersecurity Resolution # 4: Think Strategically

Center for Internet Security
01/08/2018

Center for Internet Security

Cybersecurity Resolution # 1: Resolve to invest in learning.

Center for Internet Security
01/08/2018

Center for Internet Security

Want to improve your cybersecurity posture in 2018, but not sure where to start?

You're in luck - we've created a list of 18 resolutions you can follow throughout the new year and will share one a day until the end of the month.

Center for Internet Security
12/28/2017

Center for Internet Security

Using a public wi-fi network not only puts your personal devices at risk, but also exposes your traffic to everyone else using the same network. Follow these simple tips to stay safe: http://ow.ly/fNkC30ht2AE

Center for Internet Security
12/27/2017

Center for Internet Security

Emotet is the most prevalent malware currently affecting state, local, tribal, and territorial (SLTT) governments. Learn more about Emotet in this MS-ISAC Security Primer: http://ow.ly/twz330hs0jX

Center for Internet Security
12/14/2017

Center for Internet Security

Fake charity websites are just one way cybercriminals try to scam you during the holiday season. Find out what you need to look out for to avoid falling for these seasonal tricks in the December 2017 MS-ISAC Newsletter: http://ow.ly/CVJk30hcGRC

Center for Internet Security
11/30/2017

Center for Internet Security

Simply reformatting a hard drive or reinstalling the operating system does not guarantee the old data is unreadable. Physically destroy the hard drive or use a special "wipe" program. http://ow.ly/bHIt30gV29H

Center for Internet Security
11/21/2017

Center for Internet Security

We've all seen the pop-up windows telling us that our computer is infected with a virus or other malware. Don't be fooled; the real malware could be the free software and/or free offer to fix your PC. Know How to Spot Fake Software - http://ow.ly/2xFM30gJesJ

Center for Internet Security
11/17/2017

Center for Internet Security

"Cyber ethics" refers to the code of responsible behavior on the Internet. Just as we are taught to act responsibly in everyday life with lessons such as "Don't take what doesn't belong to you" and "Do not harm others," we must act responsibly in the cyber world as well. http://ow.ly/orVG30gEhFj

Center for Internet Security
11/15/2017

Center for Internet Security

It's important to secure all portable devices to protect both the device and the information contained on the device. http://ow.ly/h77n30gBh3X

Center for Internet Security
11/13/2017

Center for Internet Security

After you have installed an anti-virus and/or anti-spyware package, you should scan your entire computer periodically. http://ow.ly/WIXK30gxM78

Center for Internet Security
11/07/2017

Center for Internet Security

Know What Information Is Being Collected When You Visit a Website - http://ow.ly/Cz1R30gqc1J

STOP. THINK. CONNECT.
10/31/2017
STOP. THINK. CONNECT.

STOP. THINK. CONNECT.

BLOG: Before National Cyber Security Awareness Month (NCSAM) wraps up, as a NCSAM 2017 Champion Kim Komando shares with some important tips on how to stay safe online.

Address

911 N 7th Ave
Pocatello, ID
83201

Opening Hours

Monday 08:00 - 17:00
Tuesday 08:00 - 17:00
Wednesday 08:00 - 17:00
Thursday 08:00 - 17:00
Friday 08:00 - 17:00

Telephone

(208) 234-6220

Alerts

Be the first to know and let us send you an email when Pocatello Information Technology Department posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Pocatello Information Technology Department: