Protecting Government

SecuLore has pioneered the art of cybersecurity for Government organizations.

According to sources, Plumas County Computer Systems (a Government organization in California) was hit with a cyber attack. It was first reported on 2021-11-18.

If You're in California, You're at Increased Risk

Cybersecurity for Government

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2021-11-18

County Administrator addresses cyber attack: DA offers tips to the public to safeguard financial data

“• “Plumas County’s computer servers have been hacked. During the Board of Supervisors meeting on Nov. 16, a member of the public said her emails hadn’t been returned, and that’s when Hydrick and and County Counsel Gretchen Stuhr shared that the email system wasn’t functioning.” • “Nothing was said about the servers in general during the public meeting. However, two county leaders who wish to remain anonymous, shared that much more was impacted by email. During this morning’s discussion, Hydrick said he wanted to share as much information as possible about the situation.” • “At this time, the depth of the intrusion is not fully known but is being addressed by the county’s IT department. Additionally, appropriate federal law enforcement have been notified and are engaged.” “

Guarding Against Phishing

  • December 13, 2017

    New Insights: The 2016 Thanksgiving Cyber Attack

  • July 26, 2017

    How Hackers Infiltrate Our Public Safety Infrastructure

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis