The Information and Technology Department provides and empowers the City's business partners and Doral's residents, visitors and businesses with sustained, reliable and efficient technology services, infrastructure and telecommunications. Leveraging state-of-the-art tools, innovative methods and strategic partnerships, we are at the center of shaping the City of Doral’s Smart City strategy. The Smart City leadership has come from the elected officials, city executives and senior staff. This is critical to building a smart city which requires championing the strategy at the highest level or the organization, a system-wide view and an integrated approach.
Today there is a strong sense of collaboration and consensus among our departments as we remain focused on the City of Doral Strategic Plan 2015/2016 and paving the way for future innovative solutions transparent, informed, and effective decision-making process for managing the demand and supply of best-managed IT services while encouraging sponsor and stakeholder engagement. Our focus is to lower the cost of services by leveraging inter-organizational collaboration and efficiencies.
The key to our Smart City Strategy is using information and communications technology to enhance our livability, workability and sustainability. To that end, the technology allows the organization to collect information about its operation through different sensors; next, that data is communicated to the information systems that process and ‘crunch’ it, analyzing the information collected to understand what is happening, initiate responsive actions and even predict what is likely to happen next. These are the core functions we follow when implementing new technologies in the City of Doral.
Making Passwords Simple
You are often told your passwords are key to protecting your accounts (which is true!), but rarely are you given a simple way to securely create and manage all your passwords. Below we cover three simple steps to simplify your passwords, lock down your accounts, and protect your future.
Cyber criminals continue to come up with new and creative ways to fool people. A new type of scam is gaining popularity—personalized scams. Cyber criminals find or purchase information about millions of people, then use that information to personalize their attacks. Below we show you how these scams work and walk you through a common example. The more you know about these scams, the easier it is for you to spot and stop them.
Search Yourself Online
Discover what information is publicly known about you
You most likely have heard how important it is to protect your privacy and the information you share online. To demonstrate this, we are going to try something new; we are going to show you how to research yourself and discover what information is publicly known about you. The process is called OSINT, a fancy way of saying Open Source Intelligence.
Yes, You Are A Target
Why You Are a Target
There are lots of different cyber attackers on the Internet today, and they all have different motivations. So why would any of them want to attack you? Because by hacking you they help achieve their goal. Here are two common examples of cyber attackers and why they would target you.
Am I Hacked?
Clues You Have Been Hacked
Just like driving a car, sooner or later you may have an accident no matter how secure you are. Below are clues to help figure out if you have been hacked and, if so, what to do. The sooner you identify something bad has happened, the more likely you can fix the problem.
And How to Avoid Them
Email is still one of the primary ways we communicate, both in our personal and professional lives. However, we can often be our own worst enemy when using it. Here are the four most common mistakes people make with email and how to avoid them.
What Is CEO Fraud/BEC?
Cyber attackers continue to evolve an email attack called CEO Fraud, or Business Email Compromise (BEC). These are targeted email attacks that trick their victim into taking an action they should not take. In most cases, the bad guys are after money. What makes these attacks so dangerous is cyber attackers research their victims before launching their attack.
Smart Home Devices
What Are Smart Home Devices?
Traditionally, only a few of your devices at home could connect to the Internet, such as your laptop, smartphone, or gaming console. However, today there are more and more devices connecting to the Internet, from your lightbulbs and speakers to your TV, door locks, and even your car.