Protecting Government

SecuLore has pioneered the art of cybersecurity for Government organizations.

According to sources, DeWitt County Government (a Government organization in Texas) was hit with a cyber attack. It was first reported on 2022-07-19.

If You're in Texas, You're at Increased Risk

Cybersecurity for Government

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2022-07-19

DeWitt County loses over $300K to cyber scam

“• “… a county employee responded to an email June 14 in which a scammer, posing as a court-approved vendor, asked to change bank account information. The change affected where future payment of the vendor's invoices were sent.” • “On July 5, the press release said, the county auditor became aware the electronic payment was made to an unverified account. Further inquiry revealed the vendor had not received any recent payments.” • “The $305,301.75 payment was made to a Bank of America bank account, County Judge Daryl Fowler said. The funds were then wire transferred to institutions outside of the United States…” • “Most of the money will be recovered through a cyber-scam insurance payment to DeWitt County of $250,000, Fowler said.” “

Guarding Against Phishing

  • February 24, 2025

    Phishing Webinar: Inside the Hacker’s Toolbox

  • October 10, 2023

    Cybersecurity Awareness Month 2023: Key Takeaways

  • April 12, 2023

    Don’t Get Hooked: Avoiding the Phish

  • November 10, 2021

    Don’t Take the Bait: Phighting the Phish

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis