Information Technology Department

The Information and Technology Department provides and empowers the City's business partners and Doral's residents, visitors and businesses with sustained, reliable and efficient technology services, infrastructure and telecommunications. Leveraging state-of-the-art tools, innovative methods and strategic partnerships, we are at the center of shaping the City of Doral’s Smart City strategy. The Smart City leadership has come from the elected officials, city executives and senior staff. This is critical to building a smart city which requires championing the strategy at the highest level or the organization, a system-wide view and an integrated approach.

Today there is a strong sense of collaboration and consensus among our departments as we remain focused on the City of Doral Strategic Plan 2015/2016 and paving the way for future innovative solutions transparent, informed, and effective decision-making process for managing the demand and supply of best-managed IT services while encouraging sponsor and stakeholder engagement. Our focus is to lower the cost of services by leveraging inter-organizational collaboration and efficiencies.

The key to our Smart City Strategy is using information and communications technology to enhance our livability, workability and sustainability. To that end, the technology allows the organization to collect information about its operation through different sensors; next, that data is communicated to the information systems that process and ‘crunch’ it, analyzing the information collected to understand what is happening, initiate responsive actions and even predict what is likely to happen next. These are the core functions we follow when implementing new technologies in the City of Doral.
 

 Information Technology Organizational Chart

RECENT NEWS - SCROLL TO SEE MORE
Online Security for Kids

The Power of Updating

Overview
Cyber attackers are constantly looking for and finding new vulnerabilities in the software you use every day. A vulnerability is a mistake or weakness in how software was developed. This software may run your laptop, the mobile apps on your smartphone, or perhaps even the software in your thermostat. Cyber attackers take advantage of and exploit these software vulnerabilities, allowing them to remotely break into systems, including the ones you use. At the same time, the vendors who create the devices and software are constantly developing new fixes for these vulnerabilities and pushing them out as software updates. One of the best ways you can protect yourself is to ensure that the technologies you use always have these latest updates. These updates not only fix known vulnerabilities, but often add new security features, making it much harder for cyber attackers to hack into your devices.

Online Security for Kids

Online Security for Kids

Background
Our kids' lives are online today more than ever, from socializing with friends and gaming, to online learning and education. So how can we help our kids make the most of online technology, safely and securely?

The Power of Password Managers

The Power of Password Managers

Are You Frustrated with Passwords?
Like most people, you likely find creating, managing, and remembering all your different passwords a daunting task. It seems like every website has different password rules and many require additional security measures such as security questions. Wouldn’t it be great if there was a single solution to take care of all your password problems? There is. It’s called a password manager.

Securing Your Financial Accounts

Securing Your Financial Accounts

Overview
Your financial accounts are a primary target for cyber-criminals. You have money, and they will do anything to steal it. By financial accounts, we mean not only your checking or savings accounts, but also investments, retirement, and online payment accounts like PayPal. Fortunately, with some simple, fundamental steps, you can protect yourself.

What is It and Why Should I Care?

Artificial Intelligence: What to Know

Overview
What is It and Why Should I Care?
Artificial Intelligence (AI) describes systems programmed to think and respond like humans. In fact, we asked the AI solution ChatGPT that very question and got this response.

Scareware: A Story

Scareware: A Story

Overview
Warning! Your computer is infected with Black Basta ransomware. Call this phone number right away to fix your computer! - If you saw this warning pop-up on your computer, would you call the phone number?

Simple Steps for Safety Online

Do I Need Security Software?

Overview
When you bought a new computer years ago, you often had to install additional security software on your computer to help ensure it was secure against cyber attackers. However, most of today’s computers and devices have numerous security features already built into them, such as automatic-updating, firewalls, disk encryption, and file protection. In addition, Microsoft provides on Windows computers security functionality called Microsoft Defender, which includes additional features such as anti-virus.

Simple Steps for Safety Online

Biometrics – Making Security Simple

Overview
Do you hate passwords? Are you tired of constantly logging into new websites or can’t remember all of your complex passwords? Frustrated by having to generate new passwords for new accounts or having to change old passwords for existing accounts? We have good news for you. There is a solution called biometrics that helps make cybersecurity easier for you. Below we explain what biometrics are, how they make your life simpler and why you will start seeing more of them.

Simple Steps for Safety Online

Browsers

Overview
Browsers such as Google Chrome, Microsoft Edge, Apple Safari, or Mozilla Firefox are one of the most common ways people interact with the Internet. We use them for reading the news, checking email, shopping online, watching videos, and playing games. As a result, browsers are also a target for cyber attackers.

Simple Steps for Safety Online

Simple Steps for Safety Online

Overview
Cyber scams are nothing new. Every day, hackers and other cyber criminals are looking for the easiest target online. Do you think you’re not worth being the target of online predators? Think again!

OUCH September 2022 Edition

Got Backups?

Overview
If you use a computer or mobile device long enough, sooner or later something will go wrong. You may accidentally delete the wrong files, have a hardware failure, or lose a device. Even worse, malware may infect and wipe or encrypt your files. At times like these, backups are often the only way you can rebuild your digital life.

OUCH August 2022 Edition

Charity & Disaster Scams

Overview
Cyber criminals know that one of the best ways to rush people into making a mistake is by creating a heightened sense of urgency. And one of the easiest ways to create a sense of urgency is to take advantage of a crisis. This is why cyber criminals love it whenever there is a traumatic event with global impact.

OUCH July 2022 Edition

Phishing Attacks Are Getting Trickier

Overview
Phishing attacks have become the most common method cyber attackers use to target people at work and at home. Phishing attacks have traditionally been emails sent by cyber attackers to trick you into doing something you should not do, such as opening an infected email attachment, clicking on a malicious link, or sharing your password.

OUCH April 2022 Edition

Top Three Social Media Scams

Overview
While social media is a fantastic way to communicate, share, and have fun with others, it is also a lowcost way for cyber criminals to trick and take advantage of millions of people. Don’t fall victim to the three most common scams on social media.

OUCH March 2022 Edition

Learn a New Survival Skill: Spotting Deepfakes

Overview
The word "deepfake" is a combination of "deep learning" and "fake." Deepfakes are falsified pictures, videos, or audio recordings. Sometimes the people in them are computer-generated, fake identities that look and sound like they could be real people.

OUCH February 2022 Edition

Anyone Can Start a Career in Cybersecurity

Overview
We read about cybersecurity in the news almost every day as organizations and governments around the world continue to get hit with ransomware, scams, and cyber attacks. There is a huge demand for people trained in cybersecurity to help defend against these growing threats. In fact, recent studies estimate that there are almost 3 million cybersecurity job openings globally.

OUCH January 2022 Edition

Spot and Stop Messaging Attacks

Overview
Smishing (a portmanteau word combining SMS and phishing) are attacks that occur when cyber attackers use SMS, texting, or similar messaging technologies to trick you into taking an action you should not take. Perhaps they fool you into providing your credit card details, get you to call a phone number to get your banking information, or convince you to fill out an online survey to harvest your personal information.

OUCH September 2021 Edition

One Simple Step to Securing Your Accounts

Overview
Does it seem like cyber criminals have a magic wand for getting into your email or bank accounts and there’s nothing you can do to stop them? Wouldn’t it be great if there was one single step you could take that would help protect your from cyber criminals and let you securely make the most of technology? While no sole step will stop all cyber criminals, one of the most important steps you can take is to enable something called two-factor authentication (sometimes called 2FA, two-step verification, or multi-factor authentication) on your most important accounts.

OUCH August 2021 Edition

Securely Using the Cloud

Overview
You may have heard of a concept called “the cloud.” This means using a service provider on the internet to store and manage your data. Examples include creating documents on Google Docs, accessing email in Microsoft O365, sharing files via Dropbox, or storing your pictures on Apple’s iCloud. While you access and synchronize your data from multiple devices anywhere in the world and share your information with anyone you want, you often do not know and cannot control where your data is physically stored.

OUCH July 2021 Edition

Securing Your Mobile Devices

Overview
Mobile devices are an amazing and easy way to communicate with friends, shop or bank online, watch movies, play games, and perform a myriad of other activities. Since these devices are such an important part of your life, it is essential to keep you and your devices safe and secure.

OUCH May 2021 Edition

Vishing – Phone Call Attacks and Scams

Overview
When you think of a cyber criminal you probably think of an evil mastermind sitting behind a computer, launching sophisticated attacks over the internet. While some of today’s cyber criminals do use advanced technologies, many simply use the phone to trick their victims.

OUCH April 2021 Edition

Privacy – Protecting Your Digital Footprint

Overview
There are many different definitions of “privacy.” We are going to focus on personal privacy, protecting the information about you that others collect. In today's digital world, you would be astounded at all the different entities that not only collect information about you, but who then legally share or sell that information.

OUCH March 2021 Edition

Identity Theft – Protecting Yourself

Overview
Identity theft happens when a criminal steals information about you and uses that information to commit fraud, such as requesting unemployment benefits, tax refunds, or a new loan or credit card in your name.

OUCH February 2021 Edition

I’m Hacked. Now What?

Overview
No matter how secure you are, sooner or later you may have an accident and become hacked. Below are clues you might have been hacked and if so, what to do.

OUCH January 2021 Edition

Securing Wi-Fi At Home

Overview
To create a secure home network, you need to start by securing your Wi-Fi access point (sometimes called a Wi-Fi router). This is the device that controls who and what can connect to your home network. Here are five simple steps to securing your home Wi-Fi to create a far more secure home network for you and your family.

OUCH December 2020 Edition

Securing the Generation Gap

Overview
Trying to securely make the most of today’s technology can be overwhelming for almost all of us, but it can be especially challenging for family members not as used to or as familiar with technology. Therefore, we wanted to share some key steps to help secure family members who may be struggling with technology and might misunderstand the risks that come with using it.

OUCH November 2020 Edition

Social Engineering Attacks

Background
A common misconception about cyber attackers is that they use only highly advanced tools and techniques to hack into peoples’ computers or accounts. Cyber attackers have learned that the easiest ways to steal your information, hack your accounts, or infect your systems is by simply tricking you into doing it for them using a technique called social engineering. Let’s learn how these attacks work and what you can do to protect yourself.

OUCH October 2020 Edition

Fake News

Background
Generally speaking, fake news is a false narrative that is published and promoted as if it were true. Historically, fake news was usually propaganda put out by those in power to create a certain belief or support a certain position, even if it was completely false. Social media has now created an environment where anyone with an agenda can publish falsehoods as if they were truths. People can be paid to post fake news on behalf of someone else or automated programs, often called bots, can publish auto-generated fake news. The motivations as to why people create and distribute fake news are as numerous as there are individual opinions.

OUCH September 2020 Edition

Online Security for Kids

Background
Kids' lives are online more than ever, from socializing with friends and interacting with family to online learning and education. As parents we want to make sure they do so in a safe and secure manner. However, this is hard as many of us never grew up in such an online environment like this. Below we cover key steps on how you can help kids make the most of online technology safely and securely.

OUCH August 2020 Edition

What is Virtual Conferencing?

Overview
With so many of us now working from home, you are most likely finding yourself remotely connecting with your co-workers using virtual conferencing solutions like Zoom, Slack, or Microsoft Teams. Your family members - perhaps even your children – may also be using these same technologies to connect with friends or for remote learning. Regardless of why you are connecting, here are key steps you can take to make the most of these technologies safely and securely.

OUCH May 2020 Edition

The Power of Updating

Overview
You may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every day. This software may run your laptop, could be the mobile apps you use on your smartphone, or perhaps even the software in your baby monitor or other devices in your home.

OUCH Mar 2020 Edition

Digital Spring Cleaning

Overview
Most of us are so looking forward to spring! The landscape starts to take shape, flowers start to bloom, and, for many, there’s a desire to spring clean. While it might be easy to see the need to purge and tidy up, realizing the need to also digitally declutter isn’t so apparent.

OUCH Feb 2020 Edition

Social Media Privacy

Overview
Most people would never consider walking into a crowded room and loudly broadcasting to total strangers all the details of their private life—from their health issues to their family and friends’ names, ages, jobs, or school locations. But often these same individuals won’t think twice about posting that same information on social media. The ramifications of sharing too much can have an impact not only on your personal and professional life but also the lives of your family and friends.

OUCH Jan 2020 Edition

Digital Inheritance

Overview
Have you ever thought about the uncomfortable question, What happens to our digital presence when we die or become incapacitated? Many of us have or know we should have a will and checklists of what loved ones need to know in the event of our passing. But what about all of our digital data and online accounts? Should we consider some type of digital will? Should we create a “digital inheritance” plan?

OUCH Dec 2019 Edition

Messaging / Smishing Attacks

Overview
One of the most common ways cyber attackers attempt to trick or fool people is by scamming you in email attacks (often called phishing) or try to trick you with phone calls. However, as technology continues to advance bad guys are always trying new methods, to include tricking you with messaging technologies such as text messaging, iMessage/Facetime, WhatsApp, Slack or Skype.

OUCH Nov 2019 Edition

Shopping Online Securely

Overview
The holiday season is nearing for many of us and soon millions of people will be looking to buy the perfect gifts. Many of us will shop online in search of great deals and to avoid noisy crowds.

OUCH Oct 2019 Edition

Four Simple Steps to Staying Secure

Overview
Making the most of technology safely and securely can seem overwhelming and confusing. However, regardless of what technology you are using or how you are using it, here are four simple steps that will help you stay secure.

OUCH Sept 2019 Edition

Scamming You Through Social Media

Overview
Many of us have received phishing email, either at work or home. These emails look legitimate, such as from your bank, your boss, or your favorite online store, but are really an attack, attempting to pressure or trick you into taking an action you should not take, such as opening an infected email attachment, sharing your password, or transferring money.

OUCH July 2019 Edition

Virtual Private Networks (VPNs)

Overview
You may find yourself needing to use public Wi-Fi for Internet access when you are away from home, such as when you are at your local restaurant or coffee shop, or when you are traveling at a hotel or airport. But how secure are these public networks and who is watching or recording what you are doing online?

OUCH June 2019 Edition

Dark Web

Overview
You may have heard the term “Dark Web” used by others or in the media and wondered “what is the Dark Web?” or “should I be doing anything about it?”. Today we explain what the Dark Web is and what it means to you.

OUCH April 2019 Edition

Making Passwords Simple

Overview
You are often told your passwords are key to protecting your accounts (which is true!), but rarely are you given a simple way to securely create and manage all your passwords. Below we cover three simple steps to simplify your passwords, lock down your accounts, and protect your future.

OUCH Feb 2019 Edition

Personalized Scams

Overview
Cyber criminals continue to come up with new and creative ways to fool people. A new type of scam is gaining popularity—personalized scams. Cyber criminals find or purchase information about millions of people, then use that information to personalize their attacks. Below we show you how these scams work and walk you through a common example. The more you know about these scams, the easier it is for you to spot and stop them.

OUCH Jan 2019 Edition

Search Yourself Online

Discover what information is publicly known about you
You most likely have heard how important it is to protect your privacy and the information you share online. To demonstrate this, we are going to try something new; we are going to show you how to research yourself and discover what information is publicly known about you. The process is called OSINT, a fancy way of saying Open Source Intelligence.

OUCH Dec 2018 Edition

Yes, You Are A Target

Why You Are a Target
There are lots of different cyber attackers on the Internet today, and they all have different motivations. So why would any of them want to attack you? Because by hacking you they help achieve their goal. Here are two common examples of cyber attackers and why they would target you.

OUCH Nov 2018 Edition

Am I Hacked?

Clues You Have Been Hacked
Just like driving a car, sooner or later you may have an accident no matter how secure you are. Below are clues to help figure out if you have been hacked and, if so, what to do. The sooner you identify something bad has happened, the more likely you can fix the problem.

OUCH Oct 2018 Edition

Email Oops!

And How to Avoid Them
Email is still one of the primary ways we communicate, both in our personal and professional lives. However, we can often be our own worst enemy when using it. Here are the four most common mistakes people make with email and how to avoid them.

OUCH Sept 2018 Edition

CEO Fraud/BEC

What Is CEO Fraud/BEC?
Cyber attackers continue to evolve an email attack called CEO Fraud, or Business Email Compromise (BEC). These are targeted email attacks that trick their victim into taking an action they should not take. In most cases, the bad guys are after money. What makes these attacks so dangerous is cyber attackers research their victims before launching their attack.

OUCH August 2018 Edition

Smart Home Devices

What Are Smart Home Devices?
Traditionally, only a few of your devices at home could connect to the Internet, such as your laptop, smartphone, or gaming console. However, today there are more and more devices connecting to the Internet, from your lightbulbs and speakers to your TV, door locks, and even your car.

 

2022 Copyright City of Doral
8401 NW 53rd Terrace Doral, Florida 33166
305-593-6725
Contact Us   |   Job Opportunities   |   Privacy Policy