
In collaboration with the Multi-State - Information Sharing and Analysis Center (MS- ISAC) PEMA provides monthly Cyber Security Tips Newsletters.
Our goal is to improve the overall cyber security posture of the City of Providence and our community partners. Collaboration and information sharing among members, private sector partners, local jurisdictions and the U.S. Department of Homeland Security are the keys to success.
PEMA Newsletters
August 2013: Java Exploits
What is Java? Java is a computer language that allows programmers and application developers to write software that can run on many different operating systems. Many applications and websites require end-users to have Java installed. Websites incorporate Java applets (small applications) to enhance the usability and functionality of a website. In general, when a user visits one of these websites, depending on their browser's security settings, they may have no idea that the Java applet is automatically running.
July 2013: Using Wi-Fi: Connect With Care
If you're traveling this summer, chances are you'll encounter a Wi-Fi hotspot (network) or two. Wi-Fi in airports, hotels, train stations, coffee shops, and other public places can be convenient, but they're often not secure, and can leave you at risk. Learn more about how to safeguard yourself.
June 2013: Keeping Senior Citizens Safe Online
Senior citizens are embracing the digital age in greater numbers every year. Fifty-three percent of adults ages 65 and older now use the Internet and online tools such as email, according to the Pew Internet & American Life Project. Among those Internet users, seventy percent report going online daily.
May 2013: Do You Know Where Your Personal Information Is?
As consumers of online services, we create information through our use of social media, online shopping, and many other activities. Public records are also a source of information about individuals, which can get posted online. It is important to be aware that once this data is online, that can be difficult to remove.
April 2013: Protect Yourself from Email Phishing Attacks
When using the email, it is difficult to know, with certainty, with whom you are communicating. Scammers will utilize this uncertainty to pose as legitimate businesses, organizations, or individuals, and gain the trust of users. If a scammer is able to gain the trust of victims, they can leverage this trust to convince victims to willingly give up information or click on malicious links or attachments.
March 2013: Protect Yourself from Email Tax Scams
It's tax season and criminals are seizing the opportunity for scams. Don't become the next victim. Scammers leverage every means at their disposal to separate you from your money, your identity, or anything else of value they can get. They may offer seemingly legitimate "tax services" designed to steal your identity and your tax refund, sometimes with the lure of bigger write-offs or refunds. Scams may include mocked up websites and tax forms that look like they belong to the IRS to trick you into providing your personal information.
February 2013: How Do I Protect the Information on My Smartphone
We've come to depend on our smartphones so heavily it is hard to remember what we did before we had them. If you have a smartphone, you now carry a fully functional computer in your pocket or purse. That's a tremendous amount of information at your fingertips! Therefore, it is paramount that you safeguard the smartphone.
January 2013: Emerging Trends and Threats for 2013
During 2012, cyber security incidents included theft of public and private intellectual property, hacktivism, ransomware, malware targeting mobile devices, and a surge of other malware, Black Hole Rootkit and Zero Access Trojan. What will we see in 2013? The newsletter has a brief round-up, listed in no particular order, of several threats and trends we can expect during the next 12 months.