​​​​​​​​​​​​​​​​​​​​​​

ITS Services

We partner with our customers and private sector companies to optimize the use of information technology resources for enhanced delivery of government services. ITS understands technology is the driving force behind your daily operations and we offer a full range of solutions designed to put technology to work for you.

​​​​​​​​​​
​​​​​

Security News & Events

Events


News Briefs

The links below are news articles regarding state and local cybersecurity. These links ar​e provided for informational purposes only and as a service to our visitors. It is the responsibility of the visitor to evaluate the content and usefulness of information obtained from these external sites. Once a visitor leaves the Mississippi Department of ITS web site and links to an external site, our web site policies are no longer applicable and the visitor will be subject to the new site's policies. Any problems, concerns or issues with these external sites should be directed to the site administrator or webmaster of those sites.

September 3 2020
Article Date Article Title
9/18/2020 Justifying your 2021 cybersecurity budget
9/17/2020 More than 80% of government cybersecurity leaders say private-public partnerships a necessity
9/17/2020 Cybersecurity: the Dos, the Don’ts and the Legal Issues You Need to Understand
9/16/2020 Report Looks at COVID-19’s Massive Impact on Cybersecurity
9/16/2020 The changing threat landscape in today’s cybersecurity
9/11/2020 Cybersecurity claims trends amid COVID-19
9/10/2020 How to Communicate With Your Remote Workers About Cybersecurity
9/9/2020 Creating a Cybersecurity Culture Starts With Your Team
9/8/2020 Cybersecurity Companies Expose Sensitive Data Online​
9/8/2020 Cybersecurity after COVID-19: Securing orgs against the new threat landscape
9/4/2020 Why data is the missing link in your cybersecurity strategy
9/4/2020 How we collect, use, store and protect your personal data
9/3/2020 Which cybersecurity failures cost companies the most and which defenses have the highest ROI?
9/3/2020 Love, hate and cybersecurity
August 2020
Article Date Article Title
8/27/2020 Why The 'C' In CEO Must Include Cybersecurity
8/26/2020 A 2020 approach to security: People matter
8/25/2020 8 steps towards a simple, airtight cybersecurity plan
8/25/2020 5 Questions Public Leaders Should Ask About Cybersecurity
8/24/2020 Microsoft says the pandemic has changed the future of cybersecurity in these five ways
8/21/2020 Know the threats to mobile security
8/20/2020 How the shift to remote working has impacted cybersecurity
8/20/2020 What enterprises should consider when it comes to IoT security
8/19/2020 New Vulnerability Threatens IoT Devices
8/18/2020 Nearly 40% of Firms Fired Staff for Security Policy Breaches
8/14/2020 How cybercriminals are exploiting US unemployment benefits to make money
8/14/2020 Most security pros are concerned about human error exposing cloud data
8/13/2020 Zero trust is critical, but very underused
8/12/2020 Cybersecurity: These two basic flaws make it easy for hackers to break into your systems
8/12/2020 Four Cybersecurity Tips Every Small Business Can Implement
8/6/2020 25% of IT workers don’t enforce security policies
8/6/2020 Misconfigured cloud storage services are commonplace in 93% of deployments
8/5/2020 4 in 10 organizations punish staff for cybersecurity errors
8/5/2020 COVID-19: Flattening the cybersecurity curve
July 2020
Article Date Article Title
7/29/2020 Remote Work Raises New Cybersecurity Challenges: Steps to Reshape Your Approach
March 2020
Article Date Article Title
3/13/2020 Hackers are using coronavirus concerns to trick you, cybersecurity pros warn
February 2020
Article Date Article Title
2/16/2020 Iranian hackers have been hacking VPN servers to plant backdoors in companies around the world
2/14/2020 Cyber Threat Actors Expected to Leverage Coronavirus Outbreak
2/11/2020 Why Ransomware Will Soon Target the Cloud
2/11/2020 Macs See More Adware, Unwanted Apps Than PCs
2/11/2020 Cybercriminals Swap Phishing for Credential Abuse, Vuln Exploits
2/6/2020 Which vulnerabilities were most exploited by cybercriminals in 2019?
2/4/2020 7 Ways SMBs Can Secure Their Websites
2/4/2020 New ransomware targets industrial control systems
2/3/2020 Three principles regarding encryption you need to keep in mind
January 2020
Article Date Article Title
1/29/2020 Number of Botnet Command & Control Servers Soared in 2019
1/29/2020 Why Companies Should Care about Data Privacy Day
1/28/2020 Data breach: Why it’s time to adopt a risk-based approach to cybersecurity
1/28/2020 52% of companies use cloud services that have experienced a breach
1/24/2020 Over half of organizations were successfully phished in 2019
1/22/2020 Big Microsoft data breach – 250 million records exposed
1/21/2020 Ransomware Upgrades with Credential-Stealing Tricks
1/21/2020 New Study Finds Cost of Cyberattacks Soaring in Florida
1/16/2020 Active Directory Needs an Update: Here's Why
1/15/2019 Why Firewalls Aren't Going Anywhere
1/15/2020 Cyber attackers turn to business disruption as primary attack objective
1/14/2020 A 101 guide to mobile device management
1/14/2020 Windows 7 computers will no longer be patched after today
1/7/2020 Texas Department of Agriculture Website Briefly Defaced
December 2019
Article Date Article Title
12/30/2019 6 CISO New Year's Resolutions for 2020
12/23/2019 20 Vulnerabilities to Prioritize Patching Before 2020
12/19/2019 Hardware hacks: The next generation of cybercrime
12/18/2019 Few Firms Use Segmentation, Despite Security Benefits
12/18/2019 5 Security Resolutions to Prevent a Ransomware Attack in 2020
12/16/2019 The privacy and security trends that will shape 2020
12/16/2019 Ransomware 'Crisis' in US Schools: More Than 1,000 Hit So Far in 2019
12/13/2019 Lessons Learned from 7 Big Breaches in 2019
12/13/2019 As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections
12/12/2019 Waking Up to Third-Party Security Risk
12/11/2019 Only Half of Malware Caught by Signature AV
12/10/2019 BYOD security challenges leave companies at risk
12/10/2019 Security 101: What Is a Man-in-the-Middle Attack?
12/10/2019 Deliver a Deadly Counterpunch to Ransomware Attacks: 4 Steps
12/9/2019 Networking attack gives hijackers VPN access
12/2/2019 How Widespread Identity Theft Has Gone Mainstream
​​