
Elk Grove Citycast
Elk Grove Citycast
Elk Grove’s Digital Defenders: How the City’s IT Team is Fending Off Cyber Attackers
Ever wonder how government safeguards your personal data from relentless cyber threats? In this episode, we dive into the shadowy world of cyber security with Elk Grove’s Chief Information Officer, Nicole Guttridge, and Network Security Engineer, Rob Pucci, to hear how the City’s IT team is fending off attacks to keep your information safe and how you can protect yourself from personal attacks on your identity and your finances.🎧 Don't miss out on this exclusive, behind-the-scenes look at the fight for your digital security!
Announcer: Welcome to Elk Grove Citycast, the podcast about Elk Grove. In each episode, we'll dive into hot topics, share what's happening in the city, and introduce you to some of the people making a difference in this place that we call home.
John Hull: Hi everyone. I'm John Hull. Welcome to the Elk Grove Citycast. Joining me is the City of Elk Grove's public affairs manager, Kristyn Laurence and Kristyn, it's great to be with you once again as we talk about what is happening in the city of Elk Grove.
Kristyn Laurence: Hello, John. Hope you're managing to stay cool. Can you believe the heat we're having?
John Hull: How many days in a row of 100-degree weather?
Kristyn Laurence: Oh gosh.
John Hull: You're the information officer, so I just thought maybe you would know that.
Kristyn Laurence: Well, we opened the cooling center at the Wackford Complex on July 1st, and it is open at this point through Tuesday, July 9th, and that's indicative of consecutive days over a hundred and relatively very little cooling overnight. And I believe I was on a call this morning where we were extending the operation of the cooling center through at least this Friday, because we're gonna continue to see those hundred plus temperatures around here.
John Hull: That's such a wonderful service because there are people. They may live here in Elk Grove, they don't have air conditioning.
Kristyn Laurence: Yeah, well, we've heard that people have been having trouble with their systems too, right? And, and the HVAC companies have got to be busy, busy, busy, right? So people may be without air conditioning on these really hot days. And so we've been trying to make sure that we're getting the information out so people know about this service. And between July 1st and July 7th, we had like more than forty people visiting. Which is a little bit more than I think we have seen in the past. So we do have the opportunity to accept anyone…adults, children even pets. So people are coming to the Wackford complex and it's been open daily from noon to 8 PM. So like really during those hottest parts of the day.
John Hull: You know, this podcast is being recorded just after the Salute to the Red, White, and Blue celebration at Elk Grove Regional Park on July 4th. So allow me first to thank you on behalf of all the Elk Grove residents for such a great celebration. How did it go for you?
Kristyn Laurence: Well, you know, the city council and staff we’re always honored to host the annual event for the community. It celebrates the city's birthday. This year we turned 24. As well as the country’s. I have to say that the heat wave had us making some last-minute adjustments to the schedule. So we shortened up our event time. So we started a lot of our activities a little bit later. So people could stay in the cool air conditioning and not come out to the park quite so early. So we started things around 7 o'clock and we did notice a drop in attendance this year, noticeably because of that heat that we were, we've been dealing with. But those that made it, it was another great concert and a great fireworks show, and I think a lot of people enjoyed that celebration.
John Hull: Thanks, and by the way, thank you for that wonderful celebration. That's number 24, isn't it, you told me? 24 in a row? Those fireworks celebrations?
Kristyn Laurence: Yeah, we've actually been doing it even before we were a city. The Chamber of Commerce had hosted it before we were incorporated. So the city picked it up in 2010. But I believe that it's been going I think it, this was our 28th annual event.
John Hull: Now this month's topic is going to be cybersecurity, and I think it's important to offer our listeners some background on why we wanted to spend one entire Citycast on a topic we know is one that, well, has no geographical boundary.
Kristyn Laurence: True, true. But it's a growing issue and it's not just for the city, but for our residents too. And as technology has evolved, so has crime, unfortunately. And cybercrimes are an unfortunate reality. Our IT team actually came to us with a proposal to come on to the podcast today. And they wanted to connect with the community to share a bit about how we protect their information from cyber criminals at the city level. And then how they could protect themselves from these kinds of bad actors. So, I applaud the IT team for wanting to be proactive and kind of share a little bit more about what we do to try and protect the local government, but also our community.
John Hull: Well, we will introduce our guests for this month's podcast in just a moment.
But first, we encourage you, our listeners, to contribute ideas for future Elk Grove CityCast topics. Email us here at publicaffairs@elkgrovecity.org. Again, publicaffairs@elkgrovecity.org.
It is becoming just too common and affecting not just individuals and business, but also city, county, and state governments. It's called cyber-attacks. Most of us think it's when a business website's broken into, money, material, and parts are stolen, and no one knows who was the perpetrator, nor where they were located at the time of the crime. Like many other communities. Men and women are trained to find and investigate cyber criminals. This is no longer a law enforcement office at the state level or in the offices of the CIA. Here in Elk Grove, we have officers whose job it is to investigate reports of criminal activity through the use of the internet.
Today we are joined by Nicole Guttridge, the city's chief information officer, and Rob Pucci, the city's network engineer, and we welcome both of you here to the Elk Grove Citycast.
Nicole Guttridge: Hi, thank you so much for having us today.
John Hull: All right, you know, this is an opportunity to talk about something that we didn't even have a clue about 10 years ago, well, 15 years ago. And I got to imagine for you both, both of you, that even 30 years ago, jobs like yours might not have existed in local governments. Now commonplace for cities to have an information technology team. So tell us what your career journey and your role has been here at the city of Elk Grove.
Nicole Guttridge: You're absolutely correct, John. Things have definitely changed over the last 30 years. I've worked at the city of Elk Grove since 2002. We had two servers and a closet, and now we have an actual data center, 15 staff working on technology and support of that technology and things change daily. I originally worked part time at the city doing basic help desk and server maintenance. Then I transitioned over to Utility Billing to do the conversion from County Billing to City Billing, and then moved back into IT under the Finance Department to oversee the non PD technology here at the City. About three years ago, I became the City's first CIO, where I now oversee the Information Services Department, which includes IT and Geographical Information Systems. Rob plays an integral role in security in our department, and he can share a little bit about that with you too.
Rob Pucci: Thanks, Nicole. I'm the network engineer at the city of Elk Grove and I’ve been with the city since 2012. Over the last five years, my role has morphed into one that's more focused on security. It might sound a little bit exciting battling hackers and all, but in reality, it's not like in the movies. I spend the majority of my day reviewing logs, alerts, creating queries, and looking for IOCs, which are indicators of compromise. In most cases, the end result is blocking an outside IP to prevent future attacks from the source. And I never see the people or know the people that are attacking our systems.
John Hull: I used to teach computer sciences and technology and everything like that when in my younger days. And so, it's worth you defining a couple of words you just got through saying there. And what is an IP? I think you said IP address. You might tell people what that is.
Rob Pucci: It's basically like a social security number for a computer. So each of us have individual social security numbers that identify us as an individual. Computers have IP addresses which identify them as using a unique number on the internet. So that unique number points directly to a server or to a service on the internet.
John Hull: So is it necessary that somebody gets on the internet and says radical things, they could be found. At least that computer could be found.
Rob Pucci: Well, in the case of hackers, a lot of times they use systems like VPNs to route their traffic from one computer to another. Or they're using compromised computer systems so that they're hidden behind that compromised system and maybe a few hops downstream. And so you never really know where the attacks coming from. At the city, we do very basic level protections for instance, blocking by GOIP, which means that we'll block regions of the world and not allow people to connect to our systems from those regions. Because we just don't have residents or employees that need to connect from there. And so to get around that, they use VPNs to make it look like they're coming from the U. S. or coming from California.
John Hull: And VPN is is a acronym that I think just about everybody knows.
Rob Pucci: Yeah, virtual private network. So basically, it allows you to look like you're coming from a location that you're not actually coming from.
John Hull: Okay, here's a word I'm going to identify right out of the dictionary, cyber-attack. It's an attempt by an individual or group to infiltrate and compromise a computer system network or device with the intention of causing harm. Cyber-attacks and resulting data breaches are really becoming a growing and persistent threat to public entities. So I have to ask the question, How often is the city of Elk Grove threatened by the cyber crooks?
Rob Pucci: Yeah, you'd probably be pretty surprised. Email wise, we get about 40 to 50, 000 blocked emails a day. Attacks against our firewalls are, are constant. It's a scrolling log of attacks that never ends. It's, it's really a constant probing where the the criminals only have to be right once and we have to be right every single time. Blocking them. So it's, it's a big challenge. Basically it's a, a, a waterfall of attacks against the city.
John Hull: It must be, I would one day like to come in and look at your system to keep people out of your computer network. That, that must be something even look at. Yeah. Okay, nobody knows that.
Nicole Guttridge: That's top secret, John.
John Hull: Alright, nobody knows that. Alright, let's talk about something though. Let's talk about cyber-attack real quick. An attempt by an individual or group to infiltrate and compromise a computer system network or a device with the intention of causing harm. Now, that's what really is illegal. Correct, guys? I guess what I want to know is what do you have to do to keep your computer system working properly?
Rob Pucci: I think one of the most important things individuals can do is keep their systems patched, whether it be a iPhone or mobile device or a computer. As new security patches are released, make sure you're installing those as soon as possible. As an organization, probably the most important thing that we can do is keep our employees trained. It doesn't help if your IT team understands the security threats if your employees don't understand those threats. So we spend a lot of time also educating our employees what to look out for, how to notify us if they see something that seems phishy, using a cyber term. Just really be available to our employees and help them spot and prevent from clicking on things or opening attachments that they shouldn't be opening.
John Hull: In every city in the state of California, your jobs, the jobs, both of you work now, say 10 years ago, did they exist? 20 years ago, did they exist?
Nicole Guttridge: Yes, I think that the jobs existed, but there were probably very different back then, right? As technology grows and becomes more advanced, then so does the skill set and the different jobs. So, you know, 25 years ago, there weren't necessarily cyber security engineers that were jobs that we were hiring for. But today they very much are. And it just has to do with the technology landscape and all of the different advancements that have been made in technology can be really great and advance in in ways that are very helpful, but alongside with all of that comes kind of this other side of it to with the cyber security issues and hacking and things like that. So definitely a different landscape now than it was probably 15-20 years ago. And I imagine in the next 15 or 20 years, it will probably look different than it does today as well.
Rob Pucci: And I think the driving factor of that is really as we get better, the people attacking our networks and attacking our users also have to get better. So it's a race to see who could be the most secure. And the goal is to not be the low hanging fruit on a tree and really make sure that they have to work to get in your network or work to fool one of your users. And we spend a lot of time on that at the City.
John Hull: So anybody trying to get into the city of Elk Grove's computer system, be it known that there were at least these two people, I mean, there's a bunch of people that know who's coming into the that's watching who is logging onto the city network, correct? I mean, this is not just…
Nicole Guttridge: We do have a cyber.
John Hull: Go ahead.
Nicole Guttridge: We do have a cyber security team now. It's a group of individuals and it that encompass many different aspects, right? So there's applications, there's hardware, software, firewalls, the network, all sorts of stuff. And so when we talk about change and things advancing, you know, we didn't have a cyber security team like that before, and we do now. So we're constantly looking for ways to share information with each other, keep up to speed with what's going on. There's, there's so much stuff on a daily basis, it would be impossible for one person to be able to do that by themselves.
John Hull: It kind of leads to this next question for you, it's really amazing how much effort is put into, I don't know, people call it cloud security systems, but in the more realistic sense, here in Elk Grove, what are the most common threats that the city system gets?
Rob Pucci: I'd say the most common threat is via email. Either a phishing email where it's trying to get someone to either do something financially, you know, buy gift cards, something along those lines, or it's an email where there's malware attached to the email and type of malicious application, and they're trying to get remote access to the computer by having the user execute the malware, and then that gives the attacker an avenue to get into our network.
John Hull: Connected to that back in 2019. Here in California, cyber-attacks cost, these are the city or state entities, $3.5 billion dollars. So when that happens, when the city or a county government gets hacked, what are they hacking into?
Rob Pucci: The majority of time it's malware put on a system and then that malware is used to ransomware. So encrypt all of their data that that user has access to so that they no longer have access to that data anymore. So the end goal is to encrypt all the information that they can and then contact the city and say that they could unencrypt all this information if you pay X amount of dollars. The next step of that is if you decide you're not going to pay that, then they're going to say that not only will we not unencrypt your data, but we also exfiltrated this data, and we're going to put it out on the internet for everyone to see. And so it's kind of a, a two part attack to try to get money from the individual cities. Their goal is to be on your network long enough so that they can verify that they've gotten rid of all your backups so that you have no option except to pay them to get your data back.
John Hull: This is, this is, I'm sorry guys, this is 23rd century stuff to somebody who grew up in 1966. All right. But, you know, the other thing that I think we need to talk about, or how the city and county municipality. are targets. How do they most adversely affect a city or county?
Rob Pucci: It kind of forces the city or a county to go to paper. The average ransomware attack against a city puts them offline from anywhere to five to six weeks. Sometimes even months. Where they have no access to their data or their electronic systems. So the, the city or county then has to switch to paper methods to process whatever they're processing that day.
John Hull: You know, the city of St. Helena over in Solano County has according to Kristyn Laurence has been hacked into twice this year. The last one was just a couple of months ago. Contra Costa County, cities of Oakley and Pleasant Hill were hit by cyber thieves in February and 23 computer systems in San Bernardino County, Oakland Modesto were hacked into. So how damaging are the attacks to just the local governments?
Nicole Guttridge: Well, it can vary on the impact of the organization based on what it is that they got into, right? If you're talking about public safety, you can hinder an entire police department, fire department you know, depending on what, what it is that they hacked and what they got into. I think that one of the biggest challenges that we look at is when we do figure out that something is going on, how do we actually know what it is? And it's often not super obvious. And so you have to be extra cautious and often shut down. More than what you want to, to ensure that you've locked, you know, locked everything down, started to go through it and really look at it forensically. And that can be very time consuming. It also depends on how big your system is, how many devices you have, how many accounts you have. It's all very relative to the size of your organization and then also what type of system that they have gotten into.
John Hull: Interesting. This is stuff we haven't talked about in the governmental area until really 10, 15 years, the last 10 or 15 years, I have a list of some techniques that hackers use to get inside a network. And so I'm going to have you guys define each one of these if you can. What is email phishing, but spelled P H I S.
Rob Pucci: So email phishing is really often the first avenue of attack. It's the way that they're trying to get into your system. Most often it's an email message sent from a, a spoof name. For instance someone could spoof Nicole's name, send me an email message and say, Hey Rob, I need you to do something Whether it be changing something on our network or buying a simple gift card and sending the gift card to the remote user. The key with email phishing is they always want to create a sense of urgency. So their goal is to get people to act on the email message quickly without really thinking about it before they act on it.
John Hull: Here's one I found and I'd like for your input on this one. Remote desktop protocols. What is that?
Rob Pucci: So RDP, or remote desktop protocol, is often used legitimately by organizations like during COVID. We used it to give our employees remote access to resources on our network. It's also a very big target for anyone that's trying to get into your network because again, it gives them remote access to your network. So here at the city, we've spent a lot of time and we've actually moved away from a remote desktop as a tool that we use here. So it's not something that's even available outside of our network. But other cities do have it and they spend a lot of time securing it through multi factor authentication, specific only, specific IPs are allowed to connect to the system, stuff like that.
John Hull: Interesting. And finally this… I don't know if you, you do not have to do a college presentation on this right now, but what is the difference between malware and ransomware?
Rob Pucci: Often they're the same thing. One leads to the other. Malware is generally the application that they're trying to get the user to install on their computer so that they could, it's called command and control, have remote access to that system via the software that they got the user to incorrectly install on their computer. Ransomware is generally what they do once they get access to a network or access to a system. And that goal is to, like I said earlier, encrypt the data. They want to remove your ability to get to important data on your network. And they do that by encrypting all the data and only they have the keys to unencrypt that data.
John Hull: All right, we can keep going on all these terms. It's interesting if you want to get really into it. But we wanted to give our listeners just a little bit of an idea about what these guys are doing to protect the system here in Elk Grove. So guys, here we go. We're combating threats to computer systems and also individuals, because individuals can be targets.
And now smartphones are becoming targets and texting scams and all that sort of thing. So, I got a, I ran across this in preparation for this podcast… pig butchering. What is, what is that?
Rob Pucci: So basically the goal of pig butchering is in probably a lot of our listeners have seen it before. You'll get a unique text message to your phone. Says something like, Hey, I won't be able to make the dinner tonight, but you have no idea who this individual is. It's not from a phone number that you recognize. And their overall goal is one to see if someone is at that phone number, at your phone number. And if they get a reply, then they'll quickly pivot to try to get you to trust them. They'll spend weeks and weeks getting you to trust them as a friend. And a lot of people fall for it. And the end goal is to get money from these people that they're texting with. And that often looks like something like they have a great investment into a new cryptocurrency, and they'll send the individuals a link to a unique cryptocurrency site. They go to the site, they add, you know, a hundred dollars just as a test first, and then they update the site to show you a hundred dollars made thousands and thousands of dollars, and they quickly get the people to invest more and more money. Of course, the, the initial investment was lost, and every investment after that is lost, and there was no money ever met, made. They just fooled the individuals to keep investing. So the, the idea of pig butchering is you start with a, a small target, you fatten that target up. And then at the end, when you have all their money, they get butchered.
Nicole Guttridge: I've also seen that happening on social media where someone's Facebook account has been hacked and then they use the hacked Facebook account to do a similar thing where they talk about, Oh, the so and so made 500 in cryptocurrency and they put links to things and you know, people try to report that their account has been hacked, but it takes a while for that to happen. So if you have 500 friends and they see that you're posting this stuff, they tend to believe it sometimes if they're not really thinking it through. And so it's happening in social media as well.
John Hull: I just recently called my son in Tennessee, he had a weird name on a new Facebook account. And I looked at it and I go, Hmm, that's not my son.
It just, you know, you just go through the photos that he did post and really anybody could steal your Facebook photos. So, you know, you got to really be careful these days, don't you? When it comes to stolen identities,
Nicole Guttridge: You do, you really have to pay attention to the details and what you just described as a great example, right? You probably saw it, looked at it, thought, Oh, it's my son. But then when you really started to look at maybe the spelling of the name or some other information that was on there, you start to ask yourself, like, well, obviously, you know, your son and he doesn't spell his name that way or something like that. But if you're in a hurry and you're on your mobile device doing things, people don't tend to pay as close of attention to those things. I think that's an easy way for things to get slipped through. We experienced that even here, right? If I read an email on my phone while I'm in a meeting or something, I'm not paying the same level of attention to it that I would be if I was sitting at my desktop and and solely focusing on that. So I think it's really important to be aware of those types of things and and think about what you're doing and when you're doing it. If you're feeling rushed or like, like Rob said, you know, they're trying to pressure you into making a quick decision. Those are really good times to just stop and pause and really say to yourself, you know, do I really need to answer this or do this this instant? The answer is probably no. And when you have a moment to go back and think about it and look at it, I think you'll discover some of those things, right? Like misspellings or, you know, really common one in these is an email. It might say it's from Nicole Guttridge, but if you hover over my name, you'll see it's some weird Gmail address, right? And. And if you know me, you know that's not my email address. So paying attention to those details are super important.
John Hull: You know, thanks for saying that because I, I think that that is the number one way of looking at an email that's come in from somebody and I'm going, and I know you, I know that person, but as I'm reading through, is this that person?
I'll go and hover my my arrow, if you will, over the email address and all of a sudden you'll see something stupid at gmail.com and you know that's not them. You just got to look at little things like that.
Rob Pucci: And you also. Oh, I'm sorry. You also have to ask yourself, do you normally get those type of messages from that individual? Because the other thing that could happen is that individual's email account is hacked. And so then it's being used to send out, there's something called a reply chain hijacking, where they go into the replies of an email account that they just hacked and try to reply to those messages to, to get either a PO paid or an invoice paid, something like that. So you really have to pay attention to the, the message. And if you have a question about it, it's always best to contact the individual at a known good number and verify that he or she sent you that message.
Nicole Guttridge: I get a lot of them from PayPal and Comcast and places like that, where it looks like they're asking me to pay my bill. But if you hover over the sender email address, you'll see it's like a Gmail account or a Yahoo or something like that. And, and I know that those invoices aren't coming. And I also think a good reminder on that front too is, you know, if you're getting an email that says you need to change your password or something's wrong with your account, don’t click on anything in the email. Go to the actual vendors website where you would normally log in and pay your bill and log in and look for a notification there because if there really was a problem, they wouldn't be asking you through email generally. It’s typically an alert that says, like, you know, my bank will be like, Oh, you have a new message log in to receive it, right? So those are also ways that they try to catch people. And, you know, if you think your bill is past due, people don't want to have that, you know, on their bill payment collection records. And so they'll log in and do it. But you really should go to the website and log in with the credentials and the website URL that you know, clicking on a link could be taking you somewhere completely different and they're trying to get your password. So if you enter it into their system, they're likely capturing that.
Rob Pucci: And same with phone calls or SMS messages you get. If they send you a phone number because we're checking on this fraudulent charge don't call them directly back at that number. Call the number that's on the back of your credit card. Always use some, a known good source for making that call or that.
John Hull: Thanks for, yeah. I was going to say, thank you so much for saying that. It is such a simple solution when it comes to something like that. You know, Nicole Guttridge and Rob Pucci has been our, have been our guest here on the Elk Grove Citycast.
We could teach a regular computer. safety seminar right here if we haven't already done so. But guys, what are some advice you would give to our residents on how to protect themselves and their families from cyber attacks?
Nicole Guttridge: I think we've talked about a lot of them today. I'm, my first bit of advice is always trust your gut. If you're looking at something and it feels a little suspicious, definitely spend the time to look into it. I always like to ask myself questions like am I expecting this? Would they ask me this in an email or over a text message? And again, going back to that original source and just not sharing personal information. There's so many different ways people collect that, like games on Facebook, you know, what's your, what's your dog's name? What month were you born? Like all of these things where you're entering this data could ultimately be used against you. So I think being really cognizant of that and being aware and just really paying attention to those details.
Rob Pucci: One advice I would give is protect your email account. Your email account really is the keys to the kingdom. If they get access to your email account, they have access to do password change requests to every other system that you have. So the password for your email account should be a unique password that you're not using anywhere else. And really protect it and don't share that with anyone. Multi factor authentication is another really easy thing. It sounds difficult, but it's Gmail, Yahoo Mail, AOL, if you use that, Microsoft Online. All of them allow you to easily set up multi factor authentication, and it's another check to kind of verify that you are who you really are. Your identity online is very important, and you want to protect that.
John Hull: Well, I've got to tell you, this has been really interesting. Like I said, we can go down to Cosumnes River College and teach an entire semester on this because it is so necessary. Nicole Guttridge, Rob Pucci, I really want to thank you both for spending time with us here on the Elk Grove CityCast.
Nicole Guttridge: Thanks so much for having us.
Rob Pucci: Yeah, thank you.
John Hull: Time now for the rapid fire segment where we attempt to stump Kristyn with questions about Elk Grove. This one I saw just recently on the See Click Fix app. In fact, I believe it was a couple of Saturdays ago. Here's what it showed. We think you're interested in watching this area. And it was a link to something else. And what is that? What do they think we are interested in?
Kristyn Laurence: Yeah, it's almost like a version of Netflix, but for your mobile app where they make recommendations to you on what you might want to watch or see. But the users on our mobile app have the ability to not only monitor the issues that they're reporting, but they can see what others have reported in their neighborhood and kind of track the progress made on those complaints. And it can be really helpful to residents that want to be kind of on the pulse of issues in their area. And it can also help duplicate reports on things that the city might already be working on to resolve. If one of our, if our listeners haven't already we would encourage them to download the See Click Fix Elk Grove app, and it's available for free on the Apple and Google Play app stores.
But then again, if they're not the tech type, we would encourage them to continue to connect with their neighbors, get active in their Neighborhood, Watch, or even attend one of the upcoming BBQ and the Beat events that's hosted by the police department. But we also have a lot of other city departments that will be out there sharing information, including probably our Public Works team with the See Click Fix app.
John Hull: But I want to add one thing just from personal experience. It seems to me that when you communicate with the city staffer through See Click and Fix, that they respond really fast. And it's like there is something. done or or attempted to be done real fast. So I would expect pretty quick action if you use that app.
All right, the next one. The annual Red, White and Blue celebration at Elk Grove Park. It was back on July 4th of course. We took most of this podcast to talk about it. But how successful was this year's celebration?
Kristyn Laurence: Again, I'll mention that the heat was definitely something that impacted our attendance this year. We believe that we attracted about half as many people to the park as we normally see. We normally get a crowd of about 20 to 25, 000 guests. We, like I said, we saw probably about half that this year because of the heat, we think. But the band was great. The vendors were there. Those that came out enjoyed the show.
Our team is already starting to prepare and plan for next year. And we hope to have some exciting additions for our 25th anniversary. So I'll encourage our listeners to stay tuned for those details.
Announcer: Thank you for listening to the Elk Grove City cast. Tune in again next month. For more interviews, information, and happenings around town like what we're doing, please rate, review, and subscribe to the show to spread the word in Elk Grove and beyond. Want more news before the next episode? Follow the City of Elk Grove on social media or sign up to receive the City's weekly email update at elkgrovecity.org.