Protecting Government

SecuLore has pioneered the art of cybersecurity for Government organizations.

According to sources, North Carolina Department of Information Technology (a Government organization in North Carolina) was hit with a cyber attack. It was first reported on 2022-10-20.

If You're in North Carolina, You're at Increased Risk

Cybersecurity for Government

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2022-10-20

North Carolina Department of Information Technology

“The NCDIT identified a cyber threat and performed system maintenance last week and over the weekend alongside the Joint Cybersecurity Task Force. The maintenance protects state systems and data.“

“Threats such as these affect state entities such as the Department of Transportation and the Department of Motor Vehicles.“

“Officials said the maintenance required all state employees to reset their NCID passwords leading to temporary access outages across state agencies.“

Source 2  |  2022-10-20

Questions linger regarding NCDIT hack

“However, the NC Department of Health and Human Services was one of the agencies affected because it posted a notice on its website saying systems that were affected by the outage are now back online.   “

“ The proactive action by NCDIT required password resets for many employees of state agencies, council of state offices and some local governments. “

“NCDIT says due to the large number of accounts, they are taking time to get reset all passwords. “

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis