ITS Services

We partner with our customers and private sector companies to optimize the use of information technology resources for enhanced delivery of government services. ITS understands technology is the driving force behind your daily operations and we offer a full range of solutions designed to put technology to work for you.


SECURING (Information Security)

Information security continues to be a major consideration today in the development of mission critical applications and systems for state government. ITS manages core and perimeter defense systems for the state network to maintain a shared and trusted environment.

The ITS Security Services Division's primary focus and responsibility is the identification, management, and​ mitigation of I​T security risks and vulnerabilities within State of Mississippi government computing, communication, an​d technology resources.​ 

News & Events

Cybersecurity Gaps Exist in Federal Agencies, White House Report Finds
The report indicated 30,899 cyberincidents occurred in 2016 that led to the “compromise of information or system functionality”  Read More

Managing third-party risk: Dominant trends
One in five organizations has faced significant risk exposure due to a third party in the last 18 months. Of those who shared loss data, 25% said that the loss impact was greater than $10 million.  Read More

The 6 Riskiest Social Media Habits to Avoid at Work
Cybercriminals are turning to Facebook, Twitter and other platforms to launch attacks via employee behavior that could be putting your business at risk.  Read More

Threats Converge: IoT Meets Ransomware
Ransomware is already a problem. The Internet of Things has had a number of security issues. What happens when the two combine?  Read More

Recent Cloud Issues Show Security Can Fail Dramatically
CloudBleed and TicketBleed hit different parts of the cloud infrastructure but show that cloud services, while usually more secure than do-it-yourself security, can fail significantly. Will such Black Swan events turn off companies to the cloud?  Read More

4 strategies to root out your security risks
To defend yourself, you must first understand the security flaws that let bad guys exploit your environment  Read More

One Lax State Can Make the Other 49 Vulnerable to a Cyberattack
All states are vulnerable to cyberattacks if even one ignores National Institute of Standards and Technology cybersecurity protocols, a framework only 20 of 35 states the National Governors Association surveyed have implemented.  Read More

Hackers Lock Pennsylvania Dems Out of Their Email, But They Refuse to Pay Ransom
Ransomware blocks access to a computer system, making its contents inaccessible absent some form of payment -- or ransom.  Read More

A Primer on IoT Security Risks
The security requirements of an Internet of Things (IoT) system are complex.   Read More