Protecting Government

SecuLore has pioneered the art of cybersecurity for Government organizations.

According to sources, DeWitt County Government (a Government organization in Texas) was hit with a cyber attack. It was first reported on 2022-07-19.

If You're in Texas, You're at Increased Risk

Cybersecurity for Government

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2022-07-19

DeWitt County loses over $300K to cyber scam

“• “… a county employee responded to an email June 14 in which a scammer, posing as a court-approved vendor, asked to change bank account information. The change affected where future payment of the vendor's invoices were sent.” • “On July 5, the press release said, the county auditor became aware the electronic payment was made to an unverified account. Further inquiry revealed the vendor had not received any recent payments.” • “The $305,301.75 payment was made to a Bank of America bank account, County Judge Daryl Fowler said. The funds were then wire transferred to institutions outside of the United States…” • “Most of the money will be recovered through a cyber-scam insurance payment to DeWitt County of $250,000, Fowler said.” “

Guarding Against Phishing

  • December 13, 2017

    New Insights: The 2016 Thanksgiving Cyber Attack

  • July 26, 2017

    How Hackers Infiltrate Our Public Safety Infrastructure

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis