Advisory
November 2, 2020
November 3, 2020
November 4, 2020
November 5, 2020
November 6, 2020
November 7, 2020
Securing Personal Devices (Part 1)- Why Is This Important?
• Protecting Sensitive Information: Most of us rely on network-connected devices to store, send, and receive sensitive information as part of our daily routine. Sensitive data could be anything from your login credentials, email content, text messages, business plan, and banking information.
• Privacy: Compromised devices allow attackers to steal your personal information and use it for political and financial gain, such as selling it on the Internet.
• Personal Devices for Work: Many security analyst reports have found cybercriminals are targeting remote workers to gain access to company networks and critical data.
• Cybercriminals Leverage Compromised Computers to Conduct Attacks: In cyberspace, a computer can be infected with malware and turned into a “zombie computer,” which is under the control a bot-herder. A cluster of zombie computers is called a botnet, commonly used to conduct email spam, DDos attacks, financial breaches, targeted intrusions, and most recently, crypto mining.
Crime Blotter for the Week of November 1-7, 2020
The following is a synopsis of crimes reported for the week of November 1– November 7, 2020
November 1, 2020
- No significant activity.
November 2, 2020
- No significant activity.
November 3, 2020
- Petty Theft (Beer Run):
November 4, 2020
- No significant activity.
November 5, 2020
- Grand Theft (Catalytic Converter):
- Petty Theft (Unlocked Vehicle):
November 6, 2020
- Petty Theft (Shoplifting):
- Petty Theft (Shoplifting):
November 7, 2020
- Grand Theft (Embezzlement):
- Assault with a Deadly Weapon:
CRIME PREVENTION CYBERSECURITY TIPS
Securing Personal Devices (Part 1)- Why Is This Important?
• Protecting Sensitive Information: Most of us rely on network-connected devices to store, send, and receive sensitive information as part of our daily routine. Sensitive data could be anything from your login credentials, email content, text messages, business plan, and banking information.
• Privacy: Compromised devices allow attackers to steal your personal information and use it for political and financial gain, such as selling it on the Internet.
• Personal Devices for Work: Many security analyst reports have found cybercriminals are targeting remote workers to gain access to company networks and critical data.
• Cybercriminals Leverage Compromised Computers to Conduct Attacks: In cyberspace, a computer can be infected with malware and turned into a “zombie computer,” which is under the control a bot-herder. A cluster of zombie computers is called a botnet, commonly used to conduct email spam, DDos attacks, financial breaches, targeted intrusions, and most recently, crypto mining.
Address/Location
City of Duarte
1600 Huntington Dr
Duarte, CA 91030
Contact
Emergency: 9-1-1
Non-emergencies: 626-357-7931
TEXT-A-TIP - Text TIP DUARTE followed by your message, to 888777