- My Government
- Departments
- Information Technology
Information Technology
Check the Status of the City WiFi.
Description
Discover how the Information Technology Department manages and oversees the city’s network and use of Technology.
Information Technology
The City's Information Technology Department is Responsible for the City and the Police Department's technology. Below is a list the services that are provided by this department:
- Network / data management
- Technology support
- IT Project Management
- City Wireless Technology
- Network Security
- Audio and Video Services
- Telecommunications
Other Areas of Technology Support
- GIS
GIS stands for Graphical Information Systems and is used by City departments to aid in the planning of many city projects - Green Technology
From Smart Surge suppressors to Virtualization Technology The City's IT department is always looking for ways to reduce our carbon footprint. - Current Projects
Server Virtualization
Windows 10 Upgrade
Upgrading Bainbridge Park Security Cameras - Strategic Initiatives
Virtualize our server infrastructure.
Transition to Soft Phones and IP Phones
Increase City Free Wi-Fi
The City can provide its guest with a wide array of Audio/Video services.
At Town Hall we have the ability to provide;
- PA system with up to 11 wired microphones at the table, a lectern with microphone, and one wireless microphone
- The ability to record from the PA system (you must provide your own digital recorder)
- Video Projector for Viewing Presentations and digital video
- Windows Laptop for Presentations
- Adaptors to connect most devices to our Projector or sound system (please check with staff prior to event)
- Free Public Wireless Internet (Password Protected)
At the Police Department EOC we have the ability to Provide;
- 60 inch smart TV for access to online content
- Same TV can be used for Presentations
- Adaptors to connect most devices (Must be checked out prior to event)
- Free Public Wireless Internet (Password Protected) Coming in May 2015
At City Hall we have the ability to Provide;
- Flat Screen TV can be used for Presentations
- Adaptors to connect most devices (Must be checked out prior to event)
Please allow a few days lead in time for any of the above, and some of the items do incur a charge for using them. Please check with staff when reserving the spaces to ensure availability and if there is a charge associated with the use of them.
CYBER SECURITY QUICK-TIP
Six tips to stop phishing attacks
With phishing and email-related attacks still among the top methods cybercriminals use to gain access to their target’s system, Check Point has put together a six-point plan to help spot and defeat these attacks.
1. Look at the Sender
Because most phishermen are not people you know, it is important to take a close look at who sent you the email. Before opening any email, you should check to see that you know the individual sender. It should be someone with whom you communicate regularly. An email out of the blue from someone you haven’t heard from in 15 years on an unrecognizable topic is cause for caution.
Now, take a closer look at the sender’s email address. Do you notice anything strange? Perhaps a zero “0” was substituted for the letter “O”, or there is a punctuation mark in the middle of the email address that shouldn’t be there, or the letters may be out of order or have an extra letter somewhere in the address. It may look similar to a real email address, but not quite right. These warnings all indicate that the sender may not be the person you think it is and should cause you to exercise vigilance.
2. Examine the Addressee List
Next, take a look at how many people received the email. Do you know those individuals? If not, it may be best to avoid opening the email. Be aware that a phishing scam may target a large number of people in your organization. If you receive an email with an unusually large number of your coworkers as recipients, and those individuals do not interact regularly or have an apparent connection, it should raise a red flag.
3. Suspect the Subject
Work communications should be related to your job function, so be sure to scrutinize at the subject line. Check to be sure that the subject is one that you would anticipate receiving in the first place. Does it make sense that you are the person getting the email in question? Is the email a reply to an email that you didn’t even send? If so, don’t open it. It is likely malware or spam at the very least. Also, take a look to see if the subject matches the contents of the message. Misalignment is grounds for suspicion.
4. Scrutinize the Timing
What time of day was the email sent? Was it at a time that you would expect someone to be sending you a business email? While many of us work with counterparts all over the globe, it is still possible to detect emails that are sent outside of the norm and avoid opening them.
5. Avoid Strange Attachments and Hyperlinks
We’ve all been told, what seems like a million times over, that we shouldn’t open strange attachments in emails or click links in emails from people we don’t know. And yet, we still do it. You can reduce the likelihood that you are opening or clicking malicious content by examining a few things. First – did you expect an attachment, and is it a common file type that you would expect to receive as part of your job? If not, don’t open it! Does the file have a weird name, or are there unusual symbols in the filename? If so, that is another sign to leave the file unopened and the link unclicked.
6. Beware of Unsettling Content
An email containing unsettling, startling, or urgent content that requires immediate action on your part is often signs of a phishing attack. We have all seen the phishing emails claiming that your bank account was hacked and you need to log in right away. Don’t fall for it. If you think it may be true, rather than clicking a link in the email, call your bank, or log into your account from their website. Whatever you do, do not use links, web addresses, or phone numbers within the email. Those may be illegitimate. Be wary and extremely cautious of these types of emails, as they may be phishing scams.
-
Mateo Ortiz
Systems Technician