Protecting Government

SecuLore has pioneered the art of cybersecurity for Government organizations.

According to sources, Town of Truckee Computer Systems (a Government organization in California) was hit with a cyber attack. It was first reported on 2021-09-30.

If You're in California, You're at Increased Risk

Cybersecurity for Government

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2021-09-30

Truckee town manager gives update on cyberattack

“• “On July 22, Truckee experienced a cybersecurity attack which breached its system and caused phones, internet, access to data, and everything that exists behind the town’s firewall to be shut down.” • “Truckee’s Emergency Operation Center was activated during the event, the town’s insurance carrier for cybersecurity was notified, and their team was brought on board. Due to the attack, according to Callaway, Truckee employees had to be outfitted with new computers and hotspots for internet access.” • “Additionally, the town lost its archived emails during the attack. “That particular exchange server was infected with a very malicious piece of malware, and it has been recommended to us by our forensic investigators that we don’t turn that on for risk of spreading that malware further into our newly rebuilt system,” said Callaway.” “

Guarding Against Phishing

  • December 13, 2017

    New Insights: The 2016 Thanksgiving Cyber Attack

  • July 26, 2017

    How Hackers Infiltrate Our Public Safety Infrastructure

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis