County Board
Committees
Employment
Forms & Documents
Minutes & Agendas
Ordinances/Policies
Municipalities
Survey
Request for Proposals/Bids
Administration
Child Support
Circuit Court (8th Judicial District)
Circuit Court Commissioner
Clerk of Circuit Court
Corporation Counsel
County Board
County Clerk
Dispatch/911 Center
District Attorney
Economic Development
Emergency Management
Facilities
Finance
Forestry
Health and Human Services
Highway
Human Resources
Land Information
Library Service
Medical Examiner
Office of Sheriff
Parks
Register in Probate
Register of Deeds
Technology Services
Teen Court
Tourism
Treasurer
UW-Madison Extension
Veterans Service Office
Higher Education
M&M Chamber of Commerce
Marinette County Elderly Services
School Districts
Calendar
News
FAQ
Contact Us
Powered by Google Translate
SEARCH
Powered by Google Translate
16°
GOVERNMENT
County Board
Committees
Employment
Forms & Documents
Minutes & Agendas
Ordinances/Policies
Municipalities
Survey
Request for Proposals/Bids
DEPARTMENTS
Administration
Child Support
Circuit Court (8th Judicial District)
Circuit Court Commissioner
Clerk of Circuit Court
Corporation Counsel
County Board
County Clerk
Dispatch/911 Center
District Attorney
Economic Development
Emergency Management
Facilities
Finance
Forestry
Health and Human Services
Highway
Human Resources
Land Information
Library Service
Medical Examiner
Office of Sheriff
Parks
Register in Probate
Register of Deeds
Technology Services
Teen Court
Tourism
Treasurer
UW-Madison Extension
Veterans Service Office
COMMUNITY
Higher Education
M&M Chamber of Commerce
Marinette County Elderly Services
School Districts
MORE
Calendar
News
FAQ
Contact Us
TECHNOLOGY SERVICES
CyberSecurity Information
-
Cybersecurity Tips
-
SANS OUCH! Cybersecurity Newsletters
BACK TO ALL DEPARTMENTS
Select Department Section
TECHNOLOGY SERVICES
CyberSecurity Information
- Cybersecurity Tips
- SANS OUCH! Cybersecurity Newsletters
Back to All Departments
Departments
»
Technology Services
»
CyberSecurity Information
SANS OUCH! Cybersecurity Newsletters
Atrificial Intelligence
- The Basics You Need to Know.
Disposing of Your Mobile Device
- Tips on what you should do before you get rid of that old device
Going on Vacation? Simple Steps to Make it Cybersecure
- Vacation tips to keep you CyberSafe!
How to Outwit Malicious Mobile Apps!
- Tips on determing whether a mobile app is safe or not!.
Identify Theft: Preventing, Detecting, and Responding
- Tips on reducing your exposure to identity theft!
I've Been Hacked, Now What!
- Tips on recognizing if you have been hacked and what to do.
Messaging Do's and Dont's
- Hints and tops on various types of messaging applications.
One Simple Step to Securing Your Accounts
- 2 Factor Authentication
Online Security for Kids
- Simple tips to help keep kids safe online.
Passphrases vs. Passwords
- A brief explaination
Phishing Scams
- How to avoid that phish!
Phone Call Attacks and Scams
- what they are and how to handle them
QR Codes!
- what are they and why can they be dangerous!
Securing Your Mobile Devices
- Tips on securing your mobile devices.
Smart Home Devices
- Tips on securing your smart home.
Smart Home Devices: Lock Them Down Before Cyber Criminals Do!
- Tips to lock down those smart home devices!
Stop that Malware
- What it is and how to help stop it.
Stop Those Phone Call Scams
- Tips on reducing the number of scam phone calls you receive.
Text Messaging Attacks
- A Smishing Saga - Tips on Spotting and Stopping Smishing Attacks.
The Power of Passphrases
- Why use a password when you can use a Passphrase!
The Power of Password Managers
- Why you should use a password manager to organize and track your passwords.
The Power of Updating
- Why you need to keep your systems and software up to date.
Top Cybersecurity Tips for Vacations
- Suggestions on keeping cybersafe while on vacation
Top Three Ways Cyber Criminals Try to Attack You!
- Discussion on Smishing, Vishing and Phishing.
Two Factor Authentication
- Protect your online presence
Unveiling the Shadows: How Cyber Criminals Steal Your Passwords
- Insight into how your passwords may be stolen.
Voice Cloning Attacks
- Defend Against Voice Cloning Attacks
Yes! You are a Target
- Why your on-line accounts have value and tips on how to protect them