Information security continues to be a major consideration today in the development of mission critical applications and systems for state government. ITS manages core and perimeter defense systems for the state network to maintain a shared and trusted environment.
The ITS Security Services Division's primary focus and responsibility is the identification, management, and mitigation of IT security risks and vulnerabilities within State of Mississippi government computing, communication, and technology resources.
News & Events
Did you know that January 28 is Data Privacy Day?
Cybersecurity threat landscape in 2018
In 2017, we saw a lot of high profile hacks, such as the famous Equifax breach, as well as those at Google, Uber, Verizon and many more. Read More
Bringing Shadow IT Into the Security Light
Practically every organization now has an “invisible network,” in addition to its official computer network, consisting of ties to cloud services that IT and security teams know little or nothing about. Read More
Why incident response is the best cybersecurity ROI
Former White House CIO Theresa Payton says unexpected breaches can wreak havoc on a company's bottom line. Read More
New Ransomware Tactics Are ‘Unstoppable’
Hackers are growing much more adept at getting people to open email infected with worms, as the network operators of Mecklenburg County government in North Carolina are the latest to discover. Read More
The average company suffers 5 IT incidents a month: study
The average organization suffers five critical IT incidents a month, with each one costing the IT department on average USD $36,326 and a further $105,302 to the rest of the business. Read More
Enterprise USB security is outdated and inadequate
While USB drives are ubiquitous for employees across all industries, security policies for these devices are often severely outdated or grossly inadequate for protecting critical enterprise data, according to Apricorn. Read More
To protect your network, you must first know your network
A sobering statistic regarding commonly used security controls was highlighted in a recent report. Read More
The evil of vanity metrics
With the fast-paced evolution of tools and connectedness in business operations, the amount of network and log data has exploded. Read More
The best mobile threat defense is mobile threat detection
It’s time to add MTD to your Enterprise Mobile Management toolkit. Read More