CR News, Volume 26, Number 1, January-March 2021 Page: 2
14 p. : ill.View a full description of this periodical.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
Access and Dissemination Bureau (ADB) continued
87th Leqislative Session
The 87th legislative session began on January 12, 2021. ADB has been actively monitoring bills relating to agency's
access and requirements for dissemination of criminal history record information. ADB will keep agencies abreast of and
changes in statute pertaining to access of criminal history information for non-criminal justice purposes.
CJIS Technical Security Office
A Fresh New Start for Security Planning
Technology advances rapidly, so do cybercriminals. Ransomware or targeted cyber-attacks can happen to anyone
anywhere. Stay cyber alert. Protective measures are simple, cost-effective and immediately beneficial. Protective
measures can help prevent ransomware from occurring in the first place. Prepare for a ransomware attack as though yo
can be a victim at any time. There are steps you can take to protect yourself and the agency.
Get to know your critical data. Know what data is most important to you and the agency. With your agency, personal
information, or devices, you need to consider what can and cannot be replaced, what to budget for to recover the
information or device loss, what you are willing to live without, and what must be kept safe.
Any data loss could limit the ability for the agency to conduct day-to-day activities. While one might think photos and oth
business documents are most important, it is worth considering other critical data to agency operations, for example:
financial/transaction data, customer data (CJI, PII, contact information), communication platforms (access to and histor
of emails; if the agency is down, business email may be down too), calendars (appointments, hearings and bookings).
Update devices and turn on automatic updates as cybercriminals use known weaknesses to hack devices. System
updates have security upgrades to patch these weaknesses. Always update the systems and applications when prompt
with automatic updates turned on. Remember to apply security fixes and updates to network equipment too- VPN
solutions, firewalls, routers, etc. See CJIS Security Policy requirements in Section 5.10.4.1.
Turning on two-factor authentication or advanced authentication increases cyber security. Two-factor authentication
means there are two checks in place to prove identity before accessing an account. For example, you may need to sups
an authentication code from an app and your password. This can make it more difficult for someone to access your files
account. See CJIS Security Policy requirements in Section 5.6.2.2.
Remember to use strong passwords and passphrases for your accounts. Longer is stronger and change them frequently
Unless you have a photographic memory and can recall everything, consider an encrypted password manager to help s
and organize them. See CJIS Security Policy requirements in Section 5.6.2.
Set up and perform regular backups. A backup is a digital copy of your most important information at rest (e.g. CJI data,
evidence photos, or financial information) saved to an external storage device or to the cloud. For CJIS compliance ens
files are encrypted with FIPS 140-2 level encryption before CJI data transmits outside the device or entity. CJI cloud datmust remain in the U.S. or an APB member country. The agency must retain control or management of the encryption
keys. CJI data stored at rest must be a minimum FIPS 197 encryption. See specifics on encryption in CJIS Security Poli
Section 5.10.1.2 and cloud requirements in Section 5.10.1.5.
Regular offline backups provide good resources to a quicker recovery. Backups are good; also remember to randomly t
a file restore before a crisis to offer a little peace of mind the backup functions as expected. It would be too late during a
needed recovery to find the files were not copied correctly, the files are corrupted or the last backup also contains
ransomware. Ensure there are regular separate intervals of backups possibly in different locations or on different media
platforms.u
er
ed
ply
or
y.
ort
ure
aicy
est2
Upcoming Pages
Here’s what’s next.
Search Inside
This issue can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Periodical.
Texas. Crime Records Division. CR News, Volume 26, Number 1, January-March 2021, periodical, January 2021; Austin, Texas. (https://texashistory.unt.edu/ark:/67531/metapth1511142/m1/2/: accessed July 17, 2024), University of North Texas Libraries, The Portal to Texas History, https://texashistory.unt.edu; crediting UNT Libraries Government Documents Department.