The responsibility of maintaining a secure courthouse network extends beyond the IT department. Everyone involved in the courthouse ecosystem must be aware of your specific policies for security. While policy details will vary by location, here are a few easy-to-remember best practices.
USB Drive Protocol:
Never use an opened USB drive from an outside source. Make sure your court has a policy on the use of USB drives. If someone must have information from your courthouse on a USB drive, insist that it must be new in factory-sealed packaging.
Complex Network Passwords:
Use complex network passwords to thwart hackers. Avoid simplistic logins and passwords (like User: courtroom 1, Password: courtroom 1) as these can provide easy access to experienced hackers.
Do not click on email links from nontrusted sources. Exercise caution and verify the authenticity of emails before interacting with any links or attachments.
Secure Data Backups:
Regularly back up your data to a secure source, preferably on a separate cloud-based network or offline storage.
Below, we define a few common words to help you better understand the network threats in today’s world.
- Malware is any software used to gain unauthorized access to IT systems in order to steal data, disrupt system services or damage IT networks in any way.
- Phishing is an online scam using deceitful or misleading tactics to entice users to share private information.
- Ransomware is a type of malware identified by specified data or systems being held captive by attackers until a form of payment or ransom is provided.
JAVS stresses the shared responsibility of maintaining network security within the courthouse environment. By adopting best practices, such as utilizing wired camera systems, keeping regular backups off the network, and remaining vigilant against potential threats, we can collectively contribute to safeguarding the integrity of your court systems.