IT icon

INformation Technology

City of Gary Seal White on Blue Background

Mission Statement

I&T is committed to providing the timely delivery of strategic, responsive, cost effective technology solutions and quality services to meet the goals defined by the Mayor, City Council and Gary’s citizens.

IT Governance

Ensuring information technology is structured and employs a well thought-out, comprehensive strategy across all City entities that includes risk management, performance, and security.

Communications

Providing integrated connectivity for City agencies and departments. Disseminating critical communications across the network and providing access to information via Gary TV.

Applications

Building applications to enhance distribution of information, add convenience and automation to transactions, and increase access to city services.

Infrastructure

Infrastructure provides services across multiple technical platforms, systems, and general technical services.

Innovation

Developing and sustaining innovative technology practices within the City through engaging and empowering citizens, improving business processes, working collaboratively and constantly searching for new opportunities.

CLICK HERE FOR IT SUPPORT

Cyber Security Tips

GOING MOBILE

SECURITY FOR YOUR MOBILE DEVICE

Your phones, laptops, and tablets have tons of information about you on them that needs to be protected.

  1. Lock your device. Use the password, passcode, swipe, or PIN function — or set up touch identification — so that only you can get access.
  2. Keep all your software up-to-date. The operating system and apps you use put out new releases that guard against the latest malware, viruses and other threats. Make sure you always have the most recent versions.
  3. Delete things you don’t use. Delete all the apps and software that you do not need any more or no longer use.

USING PUBLIC WI-FI

Remember that public Wi-Fi is never secure and can’t always be trusted. Use public Wi-Fi with caution. Don’t log into anything sensitive (like financial services or email) while using it.

Be secure by getting a VPN (virtual private network) login to use when you are out and about. Another secure connection option is using a personal mobile hotspot.

STAYING HOME

SECURING YOUR WIRELESS NETWORK

Change the name of your network from the manufacturer’s default to something personal to you. Also, reset the password from the pre-set one to something complex. Remember to use a long and strong password.

Look at your network’s security settings and switch to WPA2, if that’s an option. If not, use WPA. Both of these are more secure than WEP. Also, if there is an option for “Remote Management” turn that one off.

If you can, set up a guest login for your network. Then if someone is visiting your home, you can share only the guest password with them, not your password.

Make sure you check periodically for any updates to your router’s software, so you have the latest version. You should also consider setting up a firewall.

ANTI-VIRUS

There are free security scans available from well-known companies. Use them to check out your systems. While there is a cost involved, buying anti-virus software is a good way to protect your computer (or mobile device). You can prevent viruses and other types of cyber attacks.

Make sure you set up all your security software to automatically update. That way, when a new virus or hack is spotted, you’ll get the fix to keep you safe.

APPLYING PATCHES AND UPDATES

Make sure you apply updates for your operating system, web browsers. and software (especially security software) whenever they’re available.

Go into the settings for your computer operating system and web browser to make sure they update automatically. Having auto-updates lets you know you're protected against the latest threats from malware and viruses.

IOT (INTERNET OF THINGS)

As more and more things become computerized (watches, appliances, cars, toys), it’s important to apply smart security thinking. Reports show that about five million things were connected to the Internet every day in 2016. By 2020, more than 20 billion things will be on the internet.

INTERNET OF THINGS TIPS

  1. First rule? Don’t connect if you don’t need to. Just because your fridge or bed can be connected to the Internet doesn’t mean you have to do that. If you do not see a benefit, don’t connect.
  2. Change the password right away on every device from the manufacturer’s default. The same password rules apply for things — use a strong password and make it unique.
  3. If you can, set the software to check for updates about every three months. You can also set a reminder and check for updates yourself.
  4. Connect your things through your guest Wi-Fi network (if you have one). This separates them from the home network where your important data is stored.

FOR PARENTS

There are different options for parents to use to be proactive in keeping their kids safe online:

  • Filtering and blocking: restrict access to specific sites, words, or images
  • Block outgoing content: prevents children from sharing personal info
  • Time limitation: set time limits for how long or when during a day kids can get online
  • Monitoring: record which sites are visited and get alerts for specific sites

The federal government also has some tips for parents.

CYBERBULLYING

There is a range of behavior that falls under the term cyberbullying. This includes online posts that are embarrassing, online threats or harassment, and stalking done through emails, texts, or social networks. All ages can be involved, but teens are the most common victims.

There are ways to protect your kids:

  • Limit where they post any personal information. This will limit their exposure to bullies.
  • Don’t escalate a bullying situation. An easy solution is to terminate the account and start a new one the bully doesn’t have access to.
  • Document cyberbullying with an electronic version and a paper printout.
  • If you feel your children are being harassed or threatened, report the cyberbully to the authorities. That can be either the school or police.

The Cyberbullying Resource Center has lots more information.

PERSONAL SECURITY

PASSWORDS

Use hard to guess and long (8-10 characters minimum) passwords.

Include uppercase and lowercase letters, numbers, and special characters (like “&”, “$”, and “*”). Never use names, dates, or phone numbers since those things can be found on the Internet.

Never use the same password in more than one place. That way, if your password for one site gets stolen, none of your other logins are in danger.

Consider using a password manager. It’s a good way to keep lots of unique, strong passwords without having to remember all of them. We put some options in our “tools” section below.

PROTECTING PERSONAL INFO AND DATA

Your computer and mobile devices have tons of important information on them. Make sure you protect them with strong passwords. Having a good backup routine is critical as well. There are three steps to backing up your data:

  1. Make copies of your data. Most computers have a built-in backup option (Apple support; Windows support).
  2. Store the copies using either hardware or software options. Hardware options include an external hard drive, flash drive, or a DVD/CD. Software options are online services that keep your data in the cloud. There is usually a monthly storage fee for the service).
  3. Keep the back up someplace safe. It’s a good idea to put it in a location that isn’t your home, like a relative’s house or your workplace. That way, if something happens to your home, it’s still available.

AVOIDING PHISHING

Phishing is when cybercriminals send an email or use a website to try to get you to provide personal or financial details. Sometimes they have you click a link and put malware onto your device. But there’s ways to avoid a phish:

  • Don’t respond to emails that don’t look legit. Follow up with the company directly instead of clicking the link.
  • Check for spelling or grammar mistakes in the email. Phishing hackers also try to use a sense of urgency to get you to act — don’t fall for it.
  • Look at the URL (the website address). Does it start with https://? You want to make sure you see the S for secure! Is there something that isn’t spelled right, or extra info? For example, if it says boston.gov.pl ...that’s the wrong address.

TWO-STEP VERIFICATION FOR SOCIAL MEDIA

Two-step verification is sometimes also called “login verification,” “multi-factor authentication,” or “two-factor authentication.” It’s a great way to protect your social media accounts. Through two-step verification, you set up a second factor as part of your login process.

Some options include getting a code sent in a text to your phone or getting a push notifications in an app. Using two-step adds an extra layer of security and stops anyone who might have stolen your password.

SOCIAL MEDIA TOOLS

Most social media tools provide this service, so it’s a great idea to set it up. Learn more about Facebook, Snapchat, Twitter, and other two-step options.

IF YOU’RE HACKED

Signs that you may have been hacked include:

  • your family and friends ask you why you sent an email that you never did
  • you see posts on your social networks that you didn’t make (especially asking people to click a link), or
  • you lose a mobile device.

TAKE THESE STEPS TO REGAIN CONTROL:

  1. Let everyone know. Tell your contacts to be on the lookout for suspicious emails or posts from you. And tell them to delete those emails and posts right away.
  2. Reset your password for the account that was hacked and all your other key accounts (like your email and online banking). Remember to follow the password rules (long, strong, and unique).
  3. If you think a device has been infected, update your security software and then run a full scan.
  4. If you cannot get into an account, contact that service provider right away and follow the steps they give you to recover your account.

You can take the same steps when a company lets you know it had a security breach. Better safe than sorry! Worried you're a victim of identity theft? Report it right away.

USEFUL TOOLS

We've provided some links to digital tools to help you stay safe and secure online.

NO MORE RANSOM PROJECT
Get help if you are being impacted by ransomware

PASSWORD STRENGTH TEST
Use an online password strength meter to test your password out.

PASSWORD GENERATOR
Password generators will help you create long, strong passwords.

PASSWORD MANAGER
These password managers store all your passwords securely.

TWO-STEP VERIFICATION (GOOGLE)
Here’s how to set up two-step verification on your Google account.

TWO-STEP VERIFICATION SERVICES
This page lists lots of different sites and what services they support.

LOCK DOWN YOUR LOGIN
How to make sure you have strong authentication for your online tools

GLOSSARY
Here is a list of common cybersecurity words, and what they mean.

VIDEOS

COMPUTER SECURITY

PUBLIC WI-FI NETWORKS

PROTECT YOUR COMPUTER FROM MALWARE

SECURING YOUR HOME

Test Your Internet Speed

Help us, Help you

Click here for Speedtest by OOKLA and test your internet connection at home.

Administrative Staff

Michael Ofori
Chief Information Officer
mofori@gary.gov

Lytonya Gasson
Operations Manager

401 Broadway
Gary, IN 46402
(219) 881-1323