Topics Related to Cybersecurity Awareness

Voice phishing – or vishing – overtook email-based phishing a top initial intrusion vector in 2025, according to a new report from cybersecurity consulting firm Mandiant.

Vishing is live and interactive, giving the attacker more control over the social engineering tactics.

“While email phishing often relies on volume and opportunistic delivery, interactive methods involve a live person steering the conversation in real-time,” Mandiant says.

State employees involved in business continuity are invited to join webinars during Business Continuity Resilience and Awareness Week, hosted online by the global Business Continuity Institute on May 18-22. 

These webinars are designed for anyone with a role in ensuring their organization's ability to continue functioning in the face of potential disruptions, including:

As travel season picks up – whether for personal trips, conferences, or official business – it’s important to follow a few key precautions to protect state systems and the people we serve.

Even brief tasks while you’re away, like checking email or reviewing a document, can introduce risk if you’re not using the right safeguards.

North Carolina has introduced a statewide policy that guides how executive branch employees may use publicly available generative AI tools such as Microsoft Copilot, ChatGPT, Google Gemini, and Anthropic Claude.

The Use of Publicly Available Generative AI Policy provides a safe, consistent framework that helps employees use AI responsibly while protecting sensitive information and maintaining public trust.

NC TECH Association's NEXT TECH Awards recognize exceptional performers and rising tech leaders across North Carolina. NCDIT's Dimple Katira and Albert Moore are among this year's honorees
Two NCDIT-hosted events in late March explored how local and state government officials can serve the needs and security of North Carolinians through accountability and trust.

Tax-themed phishing emails are attempting to deliver malware via Microsoft Management Console (MSC) files, warns Securonix, a cloud cybersecurity platform.

“The attack likely starts with either a phishing email link or attachment,” the researchers explain.

“The lures and nomenclature used in the filenames and lure documents suggest that the campaign follows standard tax-themed phishing methods (Income-Tax-Deduction-and-Rebates202441712.pdf for example).

State Chief Information Security Officer Bernice Russell-Bond recently visited Western North Carolina to spotlight the state’s expanding cybersecurity capabilities and reinforce the department’s commitment to developing a resilient cybersecurity workforce.

State Chief Information Security Officer Bernice Russell-Bond recently joined WPTF Radio to discuss North Carolina's new partnership with GovRAMP to elevate cloud security standards and the cybersecurity internship program we've established with the Carolina Cyber Network.

Listen now for more about our efforts to keep North Carolina cybersecure.

North Carolina’s public sector faces an evolving cybersecurity landscape that demands real-time visibility, coordinated defenses and trustworthy data to guide decision making.