Local internet provider briefs Bicknell officials on growing cybersecurity risks and low‑cost protections
Get AI-powered insights, summaries, and transcripts
Sign Up FreeSummary
SD Broadband representative told Bicknell town leaders that attackers are increasingly targeting local governments and recommended practical, low‑cost measures including staff training, multi‑factor authentication and email filtering. The company offered a free initial audit and ongoing support options.
SD Broadband representative Terrence told Bicknell town officials on Aug. 28 that cyber attackers are increasingly targeting small local governments and offered a menu of low‑cost protections and ongoing support.
Terrence said the company’s review of recent incidents shows a shift in attacker behavior toward exploiting people — "social engineering" — rather than only finding technical vulnerabilities, and described tools and practices the town could adopt to reduce risk.
The presentation outlined three core steps SD Broadband recommended: train staff and leadership on safe online behavior; deploy basic cybersecurity tools and keep devices updated; and control and monitor access to town systems. Terrence emphasized those steps need not be expensive and offered to perform an initial audit for Bicknell at no charge and to remain available as a long‑term partner if the town chooses to buy services.
Why it matters: Municipal systems that handle billing, payroll and vendor payments are attractive targets for attackers seeking quick financial gain, Terrence told the council. He said a common chain of events begins with a convincing e‑mail that prompts a user to reveal credentials, then escalates if that user has administrative rights on a network. He described a recent case in central Utah in which an infection led to fraudulent vendor payment instructions being sent to hundreds of vendors.
Suggested steps discussed with the council included: - Staff and leadership training on social‑engineering threats and verification processes for payment requests; - Multi‑factor authentication for logins; - Endpoint detection software and timely patch management for computers and mobile devices; - Email filtering that inspects links and attachments (Terrence named Proofpoint as an example of such a service); - Assigning and restricting administrative access and documenting approved software and procedures.
Council members asked technical and policy questions. One attendee asked whether the provider blocks traffic from known hostile countries; Terrence said SD Broadband runs protections on its corporate network and can offer firewall/hardening tools to customers, but an ISP cannot unilaterally block all outbound or inbound connections without running afoul of regulation. He explained the company watches for anomalies and can apply targeted protections for customers who request them.
Terrence described the audit SD Broadband offers: an initial, no‑charge assessment that produces recommended fixes, followed by optional paid implementation and an ongoing support relationship if the town wants continued assistance. "We would come in, we would implement," he said, describing the company’s preferred hands‑on approach for smaller governments.
Next steps: Council members said they would review the materials Terrence left with them and consider arranging the audit. Terrence left business cards and reiterated the company’s offer to help the town develop written policies, a list of approved tools and staff training plans.
Ending: The council thanked the presenter and moved on to the remainder of the agenda.
