County Homepage

The Download - May 2015

Project Updates

Disaster Recovery

Disaster Recovery

The Data Center has been working diligently on the Disaster Planning and Relocation project. One of the objectives of the initiative is to establish a functional, redundant disaster recovery (DR) site to ensure that agencies can access critical applications and servers in the event of a disaster. With that in mind, we are in the process of moving the Franklin County DR site to the advanced WeConnect facility in Westerville, Ohio. The county’s Disaster Recovery Strategic Plan of Action is to be updated as well to cover updated DR processes and agency requirements. The current status of the project consists of several items:

  • Funding has been approved;
  • Procurement is underway;
  • A draft project schedule has been developed; and
  • A review of the architecture has been scheduled.

Agency cooperation and collaboration is critical and much appreciated as the Data Center continues to make progress on the DR project.

Agency Communications

Internet Explorer Update

The County has several agencies still utilizing older versions of Internet Explorer. If your agency has workstations operating with versions older than IE9, we will be reaching out to discuss a plan for upgrading. The target for all agencies to be on Internet Explorer 9 or higher is May 30, 2015. If you have any questions or concerns, please contact Shirley Stephens at 525.7472 or

Website Migration

Our active project to move County websites to an updated and more stable environment is progressing as scheduled. Seven sites were migrated successfully during the week of April 28th. Site movement will continue through August 2015. Tasha Hyler, the assigned project manager, will contact agencies throughout the project to provide advance notice and timelines for the migration of their sites. If you have any questions, please contact Tasha at 525.5694 or

IT Leadership Forum

Franklin County IT Leadership Forum and OCITA Spring Conference

OCITA Conference IT Forum

The May 8, 2015 Franklin County IT Leadership Forum is being held in conjunction with the Ohio City/County IT Association (OCITA) Spring Conference. The conference will begin at 9:30 a.m. in Meeting Room 1 of the 369 South High Street building. The forum and conference will conclude at 4:00 p.m. following a vendor expo in the first floor auditorium of the 373 South High Street building. The theme of the program is "Securing the IT Infrastructure and Data." Corey Collins, FBI Cyber Security Specialist, will be the keynote speaker.

The event is available at no charge to all Franklin County employees. A light breakfast and lunch will be served. Please e-mail if you would like to attend, or contact Max Starner at for further details.

Agency Spotlight

Franklin County Court of Common Pleas - Division of Domestic Relations and Juvenile Branch

Many county agencies participate in events that give back to the community. Learn more about the blood drives hosted by the Franklin County Court of Common Pleas - Division of Domestic Relations and Juvenile Branch.

Did You Know...

Hackers...What's Next?

By Max Starner, Client Executive Manager, Franklin County Data Center

Hackers, cyber-attacks, stolen data: Words like these are appearing in headlines every day.

As companies are faced with greater threats from hackers, they are working to increase cyber security and implement stronger measures to protect customer data. As such, stealing credit card information from businesses is now getting more difficult for cyber criminals. To adapt to these changes, hackers are shifting their focus to other data-rich targets, like smartphones and other mobile devices. They are finding it remarkably uncomplicated to access sensitive data on these personal devices if they are not encrypted, and information can be easily retrieved from the device and sold to untrustworthy sources.

Despite the increased threat to cyber security, help is available through items such as secure apps and the development of easy-to-use biometric technology. People with smartphones today (approximately 60% of the U.S. population) have many useful tools at their disposal, including state-of-the-art cameras, microphones, fingerprint scanners, touch screens, and secure wireless technology. Such tools are contributing to the increased adoption of biometrics—the identification of individuals by personal characteristics—for security purposes in many different situations, including in the workplace. For example, the use of fingerprint scanners on mobile devices is set to become more prevalent in the near future. Companies such as Apple offer secure applications like "Apple Pay." Apple and Qualcomm have contributed to developments in fingerprint technology on mobile devices as well. Other chip makers like ARM and Intel also are working on biometric security measures.

Increased cyber-attacks also lead to more business for credit and identify protection firms; a simple web search can identify top 10 providers. Some homeowner’s insurance policies also offer protection for mobile devices.

With cyber threats ubiquitous and security measures continually evolving, what can users personally do to protect their devices? Here are some helpful tips to thwart the hackers:

  • Use an access passcode or thumb print
  • Apply regular updates to your device
  • Enable encryption
  • Avoid using public Wi-Fi, especially when accessing bank accounts and other personal data that you would not want to share
  • Only install mobiles applications that are offered by trusted sources
  • Have a phone locator or remote erase application installed
  • Disable unwanted or seldom used services
  • If you have a work device, ask your employer if it is protected
  • Wipe your device before disposing of it—check with your mobile provider if you are uncertain of how to do this

Miley, John. The Kiplinger Letter Tech Alerts: Forecasts for Executives and Investors. April 2015.
Pelgrin, William F. "Security in the Mobile Era." Cyber Security Tips Newsletter. April 2015.