Workshop method

U.S. and State Officials Host Regional Election Cybersecurity Workshop

U.S. Homeland Security officials say campaign and election cyberattacks are cited as “wider and more pervasive” in 2022. Authorities on the subject met for an online workshop this afternoon to teach the people of Tennessee how they can make a difference.

Cybersecurity in our elections is a topic that has taken center stage over the past two years.

Tennessee Secretary of State Tre Hargett said because of this, the challenge is no longer just providing secure voting, but combating misinformation about the system.

“Not only do we have to fight the real threats to our electoral infrastructure, we have to fight the perceptionScreenshot 20220818 170101 Video playerSystems have been compromised. That’s why it’s never been more important for us to make sure we’re sharing credible information when you share anything about the election on social media using trusted sources such as your state and local election officials. your county. And we all play a part in protecting our electoral process,” Hargett said. ”

Kim Wyman is the Senior Election Security Officer for the US Cybersecurity Agency. Wyman said there are several ways to make a difference, including having strong passwords, being aware of phishing tendencies and keeping devices up to date to avoid ransomware.

“We’re also seeing a slight uptick, really across the spectrum, not just in ransomware polls. It seems like a threat that was there before, but I think we’re seeing a lot more ransomware activity, and it’s hitting county governments, local governments, and certainly has potential for election offices,” said said Wyman.

Dr. Cliff Newman is a cybersecurity specialist. He expanded on ransomware terminology and explained simple tips for securing voter information.

“Ransomware is an example of malicious code. In this case, when installed on your system, it will block or encrypt the data on your device and then demand a ransom to give you access to that data,” Newman said. “The other thing that happens with ransomware is that it often threatens to leak the data unless you pay a ransom. So the basic thing here is that you want to prevent this malicious code installed on your device, usually it ends up being installed on computers because you click on a wrong link, maybe it was a link in a phishing email, for example For this link to trigger code to download to your device and cause that code to execute, it must exploit certain vulnerabilities in your system, which is why it’s important to keep your system software updated.

Other tips include using a strong password, but a password by itself won’t be very strong because it’s a word. Adversaries already have a list of all these passwords, the dictionary. This is why it is advisable not to use a word that is in the dictionary, or something that is otherwise easily accessible.

Phishing is a popular method for hackers to obtain data. It is a method of collecting personal information like paVideo capture 20220818 170148sswords or credit card numbers using deceptive emails, websites, apps or text messages. Phishing is the main means of access for hackers. It can be very difficult to detect phishing schemes. There are sites that cheat nearly half of the users presented to them, according to Newman.