Mohave County School Districts Receive Additional State Aid Funding

Lake Havasu City, AZ – The Arizona Department of Revenue has notified Mohave County that 13 school districts within the county should anticipate receiving over $8 million total for fiscal year (FY) 2015 in real and personal property tax roll additional state aid to education (ASAE) dollars.  “These funds will drastically help our school districts,” Supervisor Buster Johnson stated.  “With only 17% of Mohave County being made up of private property, our school system cannot function on property tax dollars alone, which is why this funding is greatly needed,” Johnson continued. In the 1980s, the Arizona state legislature started a K-12 school finance system based on a statutory formula.  Under this formula, school districts receive state aid based on student enrollment and property wealth.  In Mohave County, the highest recipient of funding for FY15 will be the Lake Havasu Unified School District receiving the most at a little over $3.7 million.  The second highest recipient will be the Kingman Unified School District with a little over $2 million. According to Mohave County Superintendent Mike File, the state aid dollars are sent out to school districts in three to four disbursements throughout the year.  The funding aids districts in helping to pay teacher salaries, benefits, utilities, and building maintenance. The other school districts throughout the county that are anticipated to receiving this funding are: The Hackberry Elementary SD # 3: $20,689.70 Owens Elementary SD # 6: $3,103.66 Moccasin-Fredonia Elementary SD # 10: $15,532.92 Topock Elementary SD # 12: $53,470.14 Bullhead Elementary SD # 15: $669,433.19 Mohave Valley Elem. # 16: $443,627.91 Valentine Elem. SD # 22: $2,404.78 Colorado River UHS: $1,166,531.24 Peach Springs Unified SD # 8: $3,381.30 Littlefield/Mt.Trumbull Unified SD # 9: $87,927.36 Colorado City Unified SD # 14: $68,042.00  

Supervisor Johnson Warns of Spying through Android Based Flashlight Apps

Lake Havasu City, AZ – Supervisor Buster Johnson would like to warn the public of a new cyber threat affecting mobile devices.  According to a threat assessment report done by SnoopWall, an international counter surveillance security software company, the top 10 free flashlight apps in Android’s Google Play store contain malware that allow hackers to spy and gather personal information.  “Nearly half a billion installations of these apps have occurred causing major concern,” Supervisor Johnson, 1st Vice Chairman of the National Association of Counties Cyber Security Task Force Team, stated.  “While these apps may be a great convenience for users who need to find their house keys in the dark, they are posing a great security threat to every user who installs them,” Johnson continued. According to the report, users who install these apps are unknowingly giving hacker’s permission to locate them through GPS, read their personal information stored on the device, view personal photos and videos and even gain access to their financial information.  “Users who have installed the flashlight app and do mobile banking through their device are at a greater risk for exposure because of the vulnerability found in these apps,” Johnson said.  According to SnoopWall CEO, Gary Miliefsky, the average size of a flashlight app should be no more than 72 kilobytes.  The size of these flashlight apps are ranging anywhere from 1.2 to 5 megabytes.  “These hackers are embedding more code than necessary into these popular apps which allows them to collect personal data and spy on the cell phone user,” Johnson said. While the report done by SnoopWall focused on the top 10 Android apps, it did mention that Windows and Apple iOS users should still remain cautious when downloading third party apps. The following are ways users can increase their privacy and security to avoid some of these vulnerabilities on their mobile device: Disable your GPS at all times except in an emergency or when needed for navigation purposes; Disable the NFC (Near Field Communications) or on Apple devices, iBeacon, permanently (http://support.apple.com/kb/HT6048); Disable Bluetooth at all times except when needed to make hands-free calls Verify apps behavior and privacy risk BEFORE installing – do some research and ask the questions “why does this app need GPS, MICROPHONE, WEBCAM, CONTACTS, etc.?” – most apps don’t need these ports unless they want to invade your privacy. Find an alternative before installing risky apps. To read the full report done by SnoopWall, please visit: http://www.snoopwall.com/threat-reports-10-01-2014/

Board of Supervisors Lease Office Space to Local DAV Chapter

Lake Havasu City, AZ – During today’s Board of Supervisors meeting, the Board voted to approve a one year lease of a 168 square foot portion of the county’s Lake Havasu City Complex to the Disabled American Veterans (DAV) Chapter 27 of Lake Havasu City.  Supervisor Buster Johnson, who placed the item on the agenda, stated that he knew that the current office space leased by the DAV was limited.  “When the space at the county became available I approached them to see if they were interested,” Johnson stated. According to Johnson, the County was previously using the space as a janitorial closet.  “I brought the item before the Board because I felt that letting the DAV’s lease that space would be a better use for it,” Johnson continued.  Johnson stated that the DAV will use the space for administrative purposes as well as assisting veterans with transportation needs to other cities.  The lease agreement will begin on November 1st and conclude on October 31, 2015.

Cyber Security Tip #6

Cyber Security Tip #6: Encrypt Your Data With major data breaches being reported all too frequently, organizations are now placing increased emphasis on security of personal, private and sensitive information. One method of increasing security is through data encryption. Encryption is the process of scrambling a message or data so that no one but the sender and the intended recipient can read it. Encryption solutions generally encompass two types: hardware and software. Examples of hardware encryption include a pre-encrypted USB device or hard drive; software encryption consists of a program installed on a machine that encrypts some or all of the data on the system. A variety of encryption tools are available on online. It is important to note that any solution you implement should be compliant with accepted industry standards. It is recommended that you should minimally employ a 128-bit Advanced Encryption Standard (AES) solution. For more information on data encryption, please check out the Multi-State Information Sharing and Analysis Center website at:http://msisac.cisecurity.org/newsletters/documents/2012-09MSISAC.pdf

Cyber Security Tip #5

Cyber Security Tip #5: Protecting Yourself on a Public Computer If you access the Internet from a shared computer, make sure you don’t leave anything behind Being able to access the Internet from different locations — the library, a computer lab at school, an Internet cafe — is a great convenience, but it can also pose a security risk to personal information. If you do access the Internet from a shared computer, here are a few things you need to remember. 1. Don’t check the “remember my password” box. 2. When you’re done, make sure you log off completely by clicking the “log off” button before you walk away. 3. If possible, clear the browser cache and history. 4. Never leave the computer unattended while you’re logged in. 5. Trash all documents you used, and empty the recycle bin.

Cyber Security Tip #4

Cyber Security Tip #4: Five cyber security tips everyone should be aware of. 1. If you don’t understand the warning message, say no. It’s easier to go back and say yes if you need to than be sorry and have to rebuild your machine. 2. Certificates: If you don’t understand a website certificate message, say no. It is easier to go back and say yes if you need to than be sorry and have to rebuild your credit. 3. Antivirus: Running antivirus does not slow your computer down nearly as much as a virus does. 4. Back-up: Backing up your data may seem like a waste of time — er, until you spill coffee all over your laptop. 5. Passwords: Writing down your password around your desk is about as secure as leaving a $20 bill lying on the dashboard of your car. How well do you trust anyone these days?

Havasu Health Fair

“Going on now at the Aquatic Center One stop for all your health questions.” From HAVASU HEALTH FAIR, posted by Buster Johnson on 10/04/2014 (9 items) Generated by Facebook Photo Fetcher 2

Breast Cancer Walk

From BREAST CANCER WALK, posted by Buster Johnson on 10/04/2014 (11 items) Generated by Facebook Photo Fetcher 2

King of Body Beach

“Time trials are starting with racing the rest of the day at Rotary Beach, Lake Havasu City” From King of Body Beach AquaMoto Gran Prix, posted by Buster Johnson on 9/27/2014 (9 items) Generated by Facebook Photo Fetcher 2

Cyber Security Tip #3

Cyber Security Tip #3: Protect Your Children Online It is important to talk to your children about online safety and let them know that you can be approached with questions about behaviors or problems that they may encounter when online. Parents can teach their children how to safely use a computer and the Internet. The Multi-State Information Sharing and Analysis Center listed some simple steps that parents can take to help reduce security risk to children. They are: • Keep your computer in a central and open location in your home and be aware of other computers your child may be using. • Discuss and set guidelines and rules for computer use with your child. Post these rules by the computer as a reminder. • Use the Internet with your child. Familiarize yourself with your child’s online activities and maintain a dialogue with your child about what applications they are using. • Implement parental control tools that are provided by some Internet Service Providers and available for purchase as separate software packages. • Consider using software that allows you to monitor your child’s e-mail and Web traffic.