Protecting Government

SecuLore has pioneered the art of cybersecurity for Government organizations.

According to sources, Scott County (a Government organization in Iowa) was hit with a cyber attack. It was first reported on 2025-03-04.

If You're in Iowa, You're at Increased Risk

Specialized Cybersecurity for Critical Infrastructure

Manage your organization’s attack surface with SecuLore’s passive cyber threat detection.

  • Asset Discovery
  • Vulnerability Assessments
  • Risk Prioritization
  • 24/7 Active Threat Detection

  • Continuous Monitoring

Source 1  |  2025-03-04

Scott County reports data privacy incident

“Scott County reported a data privacy incident that may have impacted select individuals.“

“According to the county, on July 11, 2024, they became aware of suspicious activity in a Health Department employee’s email account. Immediately, the county launched an investigation“

“The investigation determined that an unauthorized user gained access to the email account between July 10 and July 12, 2024, according to the county. “

“Upon learning of the situation, Scott County immediately took steps to ensure the security of the email account and investigate. “

Guarding Against Hacking

  • October 25, 2017

    Hackers Gone Wild: How Cybercriminals Impact 9-1-1 Systems

  • November 11, 2020

    4 Year Anniversary – Twitter TDoS Attack

  • October 14, 2020

    Incidents from the Trenches

  • July 8, 2020

    The Vicious Evolution of Cyber Attacks

Guarding Against Phishing

  • February 24, 2025

    Phishing Webinar: Inside the Hacker’s Toolbox

  • October 10, 2023

    Cybersecurity Awareness Month 2023: Key Takeaways

  • April 12, 2023

    Don’t Get Hooked: Avoiding the Phish

  • November 10, 2021

    Don’t Take the Bait: Phighting the Phish

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis