You are here

National Cybersecurity Awareness Month

DLT Cybersecurity Expert, Don Maclean

Headshot of Don Maclean, Chief Cyber Technologist, DLTHave cybersecurity questions, but don't know who to ask? Don Maclean, DLT's Chief Cybersecurity Technologist is here to provide valuable insight into cybersecurity challenges facing the public sector. Don’t let your important cybersecurity questions go unanswered. Ask Don today.

Fill out the form on the right, and get your questions answered.

Learn more about Don.

 

 
 

 

DLT Cybersecurity Awareness Initiatives

DLT ICIT Briefing

Join us at the ICIT Fall Briefing, co-chaired by DLT, on "The Intersection of Leadership, Transformation and Security." Hear experts discuss government-wide efforts around modernization, security, and data analytics, an offer first-hand insights on how to improve success through better leadership, operational execution, and implementation. View the agenda and Register Now

GovCybersecurityHub

DLT has officially launched a new online forum focused on cybersecurity that caters to public sector professionals charged with protecting our public institutions and IT systems. We're calling it GovCybersecurityHub. Visit the forum

Don's Blogs

Don Maclean shares his wealth of knowledge in blogs, articles, and whitepapers, all available on dlt.com. Access our vault of cybersecurity knowledge.

Whitepaper

A new cybersecurity whitepaper will be published this month. In the mean time, please view our Cybersecurity resources.

DLT Cybersecurity Portfolio

DLT brings you a portfolio of security offerings to strengthen your current security posture and look ahead to new solutions that make adversaries scramble to keep pace. Explore our expanding portfolio.

Common Cybersecurity Vocabulary

Malicious attempts to damage, disrupt or gain unauthorized access to computer systems, networks or devices, via cyber means.
Find out more...
A security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network perimeter.
Read more...
The protection of data, applications, and infrastructures involved in cloud computing, involves maintaining adequate preventative protections so you: Know that the data and systems are safe.
Explore the hybrid cloud...
Malicious software that makes data or systems unusable until the victim makes a payment.
Don't get held for ransom...
Untargeted, mass emails sent to many people asking for sensitive information (such as bank details) or encouraging them to visit a fake website.
Protect yourself...
A more targeted form of phishing, where the email is designed to look like it's from a person the recipient knows and/or trusts.
Get prepared...