The Information and Technology Department provides and empowers the City's business partners and Doral's residents, visitors and businesses with sustained, reliable and efficient technology services, infrastructure and telecommunications. Leveraging state-of-the-art tools, innovative methods and strategic partnerships, we are at the center of shaping the City of Doral’s Smart City strategy. The Smart City leadership has come from the elected officials, city executives and senior staff. This is critical to building a smart city which requires championing the strategy at the highest level or the organization, a system-wide view and an integrated approach.
Today there is a strong sense of collaboration and consensus among our departments as we remain focused on the City of Doral Strategic Plan 2015/2016 and paving the way for future innovative solutions transparent, informed, and effective decision-making process for managing the demand and supply of best-managed IT services while encouraging sponsor and stakeholder engagement. Our focus is to lower the cost of services by leveraging inter-organizational collaboration and efficiencies.
The key to our Smart City Strategy is using information and communications technology to enhance our livability, workability and sustainability. To that end, the technology allows the organization to collect information about its operation through different sensors; next, that data is communicated to the information systems that process and ‘crunch’ it, analyzing the information collected to understand what is happening, initiate responsive actions and even predict what is likely to happen next. These are the core functions we follow when implementing new technologies in the City of Doral.
Shopping Online Securely
The holiday season is nearing for many of us and soon millions of people will be looking to buy the perfect gifts. Many of us will shop online in search of great deals and to avoid noisy crowds.
Four Simple Steps to Staying Secure
Making the most of technology safely and securely can seem overwhelming and confusing. However, regardless of what technology you are using or how you are using it, here are four simple steps that will help you stay secure.
Scamming You Through Social Media
Many of us have received phishing email, either at work or home. These emails look legitimate, such as from your bank, your boss, or your favorite online store, but are really an attack, attempting to pressure or trick you into taking an action you should not take, such as opening an infected email attachment, sharing your password, or transferring money.
Virtual Private Networks (VPNs)
You may find yourself needing to use public Wi-Fi for Internet access when you are away from home, such as when you are at your local restaurant or coffee shop, or when you are traveling at a hotel or airport. But how secure are these public networks and who is watching or recording what you are doing online?
You may have heard the term “Dark Web” used by others or in the media and wondered “what is the Dark Web?” or “should I be doing anything about it?”. Today we explain what the Dark Web is and what it means to you.
Making Passwords Simple
You are often told your passwords are key to protecting your accounts (which is true!), but rarely are you given a simple way to securely create and manage all your passwords. Below we cover three simple steps to simplify your passwords, lock down your accounts, and protect your future.
Cyber criminals continue to come up with new and creative ways to fool people. A new type of scam is gaining popularity—personalized scams. Cyber criminals find or purchase information about millions of people, then use that information to personalize their attacks. Below we show you how these scams work and walk you through a common example. The more you know about these scams, the easier it is for you to spot and stop them.
Search Yourself Online
Discover what information is publicly known about you
You most likely have heard how important it is to protect your privacy and the information you share online. To demonstrate this, we are going to try something new; we are going to show you how to research yourself and discover what information is publicly known about you. The process is called OSINT, a fancy way of saying Open Source Intelligence.
Yes, You Are A Target
Why You Are a Target
There are lots of different cyber attackers on the Internet today, and they all have different motivations. So why would any of them want to attack you? Because by hacking you they help achieve their goal. Here are two common examples of cyber attackers and why they would target you.
Am I Hacked?
Clues You Have Been Hacked
Just like driving a car, sooner or later you may have an accident no matter how secure you are. Below are clues to help figure out if you have been hacked and, if so, what to do. The sooner you identify something bad has happened, the more likely you can fix the problem.
And How to Avoid Them
Email is still one of the primary ways we communicate, both in our personal and professional lives. However, we can often be our own worst enemy when using it. Here are the four most common mistakes people make with email and how to avoid them.
What Is CEO Fraud/BEC?
Cyber attackers continue to evolve an email attack called CEO Fraud, or Business Email Compromise (BEC). These are targeted email attacks that trick their victim into taking an action they should not take. In most cases, the bad guys are after money. What makes these attacks so dangerous is cyber attackers research their victims before launching their attack.
Smart Home Devices
What Are Smart Home Devices?
Traditionally, only a few of your devices at home could connect to the Internet, such as your laptop, smartphone, or gaming console. However, today there are more and more devices connecting to the Internet, from your lightbulbs and speakers to your TV, door locks, and even your car.