ITS Services

We partner with our customers and private sector companies to optimize the use of information technology resources for enhanced delivery of government services. ITS understands technology is the driving force behind your daily operations and we offer a full range of solutions designed to put technology to work for you.


SECURING (Information Security)

Information security continues to be a major consideration today in the development of mission critical applications and systems for state government. ITS manages core and perimeter defense systems for the state network to maintain a shared and trusted environment.

The ITS Security Services Division's primary focus and responsibility is the identification, management, and​ mitigation of I​T security risks and vulnerabilities within State of Mississippi government computing, communication, an​d technology resources.​ 

News & Events

WannaCry is a painful reminder of why enterprises must stay current on software updates
WannaCry is a wake-up call for the excessive numbers of companies needlessly dragging their feet over Windows 10 migrations. Certainly since Friday, we’ve seen an upswing in interest from companies hoping – suddenly – to accelerate the migration process, or automate their patching processes.  Read More

Security depends on data classification
A brief on a risk-based cybersecurity approach for state government data, “Better Data Security Through Classification: A Game Plan for Smart Cybersecurity Investments,” from the National Association of State CIOs  Read More

Rudimentary attacks pose the greatest risk to midsized organizations
Rudimentary attacks, such as intrusion attempts, information gathering, and policy violations pose the greatest risk to midsized organizations, according to eSentire.  Read More

Seeing Security from the Other Side of the Window
From the vantage of our business colleagues, security professionals are a cranky bunch who always need more money, but can't explain why.   Read More

Hackers Get Back to the Basics
As the costs of complex cyberattacks increase, old-school email tricks are coming back in style.  Read More

What you sound like after a data breach
Hopefully you’ve never had anything stolen in a data breach, but if you have I hope you’ve been spared the salted wound of the non-apology.  Read More

CISOs Admit They Are Unable to Keep Pace with Data Breaches
For the most part, cybersecurity seems to continue to be reactive rather than proactive.  Read More

Netflix Incident a Sign of Increase in Cyber Extortion Campaigns
Attackers using threats of data exposure and DDoS disruptions to try and extort ransoms from organizations.  Read More

Industry reactions to the Verizon 2017 Data Breach Investigations Report
Today’s report highlights that businesses must rethink their protection strategies to guard against cyber attacks.   Read More