Protecting Public Safety

SecuLore has pioneered the art of cybersecurity for Public Safety organizations.

According to sources, Fayette County (a Public Safety organization in Texas) was hit with a cyber attack. It was first reported on 2025-05-29.

If You're in Texas, You're at Increased Risk

Cybersecurity for Public Safety

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2025-05-29

County Confirms It Was Hit by a Cyber Attack

“A county official confirmed last week that the computer network issues the County experienced back in March were indeed the result of a cyber attack. “

“Fayette County Emergency Management Coordinator Angela Hahn told the Record last week that investigators believe someone tried to stage a ransom attack on the County’s computer systems. But she said the County did not pay a ransom. “

“The attack shut down the County’s computer aided dispatch system used by law enforcement, EMS and fire departments when responding to calls. The attack did not affect radio communications, Hahn said, so human dispatchers were still able to communicate with first responders in the field. “

Guarding Against Ransomware

  • August 16, 2023

    Ransomware is on the Rise Again: Defense Against New Players

  • November 9, 2022

    Ransomware’s Hidden Costs: What You Need To Know

  • August 11, 2021

    How to Prevent and Respond to Ransomware Attacks

  • January 25, 2017

    How to Defend Public Safety from Ransomware

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis