Protecting Public Safety

SecuLore has pioneered the art of cybersecurity for Public Safety organizations.

According to sources, Hamilton County (a Public Safety organization in Tennessee) was hit with a cyber attack. It was first reported on 2025-03-25.

If You're in Tennessee, You're at Increased Risk

Specialized Cybersecurity for Critical Infrastructure

Manage your organization’s attack surface with SecuLore’s passive cyber threat detection.

  • Asset Discovery
  • Vulnerability Assessments
  • Risk Prioritization
  • 24/7 Active Threat Detection

  • Continuous Monitoring

Source 1  |  2025-03-25

Memo: Hamilton County data breach has gone unreported

“Hamilton County officials were notified more than 240 days ago about a data breach potentially compromising financial information for more than 14,000 people, according to an internal memo this month.“

“The memo focuses on Nationwide Recovery Services, which the county contracted with for debt collection service for past due receivables across several county departments, including the criminal court clerk's office, ambulance billing, the health department and the Water and Wastewater Treatment Authority. “

“According to the memo, the firm sent a letter on Feb. 17 saying that it had reported a "cyber incident" to Hamilton County on July 14, 2024. “

Guarding Against Hacking

  • June 10, 2020

    Best Cyber Practices and Policies for Your Agency

  • April 15, 2020

    COVID-19, Elections, Taxes: How Hot Topics Impact Public Safety Cybersecurity

  • January 8, 2020

    Reviewing the Worst Cyber Attacks of 2019

  • October 16, 2019

    Fixing the Top 5 Public Safety Vulnerabilities

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis