Cyber Security

State of Maine SealThe goal of MEMA’s cyber security effort is to lessen the impact of a cyber incident on the communities of Maine. Malicious cyber activity represents a serious and ever-increasing threat to our state’s computer systems and critical infrastructure networks.

Because of this it is vital to incorporate cyber security into our state all hazards planning. MEMA’s cyber security efforts will assist communities through educational outreach, information sharing, coordination, and response.

Tips for Cyber Security

Assessments: Cyber Resilience Review (CRR)
The CRR is a no-cost, voluntary, non-technical assessment to evaluate an organization’s operational resilience and cyber security practices.

Assessments: DHS Cyber Assessments
A core component of ICS-CERT's risk management mission is conducting security assessments in partnership with ICS stakeholders, including critical infrastructure owners and operators, ICS vendors, integrators, Sector-Specific Agencies, other Federal departments and agencies, SLTT governments, and international partners.

DHS: Cyber Security
Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.

DHS: National Cyber Security and Communications Integration Center (NCCIC)
The National Cybersecurity and Communications Integration Center (NCCIC) is a cyber situational awareness, incident response, and management center for the Federal Government, intelligence community, and law enforcement.

DHS: US Computer Emergency Readiness Team (US-CERT)
US-CERT strives for a safer, stronger Internet for all Americans by responding to major incidents, analyzing threats, and exchanging critical cybersecurity information with trusted partners around the world.

Education: SBA – Cyber Security Training for Small Businesses
Self-paced training exercise provides an introduction to securing information in a small business.

FBI: Infragard Program
InfraGard is a partnership between the FBI and the private sector. It is an association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.

FBI: Internet Crime Complaint Center (IC3)
The IC3 accepts online Internet crime complaints from either the actual victim or from a third party to the complainant.

MS-ISAC: Multi-State Information Sharing & Analysis Center
The Multi-State Information Sharing and Analysis Center (MS-ISAC) is designated by the US Department of Homeland Security as the focal point for cyber threat prevention, protection, response and recovery for the nation's state, local, tribal and territorial (SLTT) governments.

Planning: NIST Cybersecurity Framework
The national and economic security of the United States depends on the reliable functioning of critical infrastructure.

Cyber Incident Reporting [2017] (PDF)
A Unified Message for Reporting to the Federal Government

Tips for Cyber Security

Keep a Clean Machine

  • Keep Security Software Current: Having the most up-to-date software is the best defense against viruses, malware, and other online threats.

  • Automate Software Updates: Turn on automatic software updates if that’s an available option.

  • Protect all Devices that Connect to the Internet: Devices like smart phones, gaming systems, and other web devices also need protection from viruses and malware.

  • Plug & Scan: USBs and other external devices can be infected by viruses and malware. Use your security software to scan them.

Protect Your Personal Information

  • Secure Your Accounts: Ask for protection beyond passwords. Two-Factor authentication is now offered by account providers as an additional means of protection.

  • Make Passwords Long and Strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.

  • Unique Account, Unique Password: Separate passwords for every account helps to thwart cybercriminals.

  • Own Your Online Presence: Set the privacy and security settings on websites to your comfort level for information sharing.

Connect With Care

  • When in Doubt Throw it Out: Links in email, tweets, posts, and online advertising: If it looks suspicious, even if you know the source, it’s best to delete.

  • Get Savvy About Wi-Fi Hotspots: Limit the type of business you conduct and adjust the security settings on your device to limit who can access your machine.

  • Protect Your $$: When banking and shopping, use caution. Look for web addresses with https:// ensuring the "s" is there which means the site takes extra measures to help secure your information.

Be Web Wise

  • Stay Current: Keep pace with new ways to stay safe online. Check trusted websites for the latest information, and share with friends, family, and colleagues.

  • Think Before You Act: Be wary of communications that require you to act immediately, sound too good to be true, or ask for personal information.

  • Back It Up: Protect your valuable work, music, photos and other digital information by making an electronic copy and storing it safely.

  • Help the Authorities Fight Cybercrime: Report stolen finances, identities and cybercrime to the Internet Crime Complaint Center and The Federal Trade Commission's Identity Theft.gov .