ITS Services

We partner with our customers and private sector companies to optimize the use of information technology resources for enhanced delivery of government services. ITS understands technology is the driving force behind your daily operations and we offer a full range of solutions designed to put technology to work for you.


Security News & Events


News Briefs

The links below are news articles regarding state and local cybersecurity. These links ar​e provided for informational purposes only and as a service to our visitors. It is the responsibility of the visitor to evaluate the content and usefulness of information obtained from these external sites. Once a visitor leaves the Mississippi Department of ITS web site and links to an external site, our web site policies are no longer applicable and the visitor will be subject to the new site's policies. Any problems, concerns or issues with these external sites should be directed to the site administrator or webmaster of those sites.

March 2020
Article Date Article Title
3/13/2020 Hackers are using coronavirus concerns to trick you, cybersecurity pros warn
February 2020
Article Date Article Title
2/16/2020 Iranian hackers have been hacking VPN servers to plant backdoors in companies around the world
2/14/2020 Cyber Threat Actors Expected to Leverage Coronavirus Outbreak
2/11/2020 Why Ransomware Will Soon Target the Cloud
2/11/2020 Macs See More Adware, Unwanted Apps Than PCs
2/11/2020 Cybercriminals Swap Phishing for Credential Abuse, Vuln Exploits
2/6/2020 Which vulnerabilities were most exploited by cybercriminals in 2019?
2/4/2020 7 Ways SMBs Can Secure Their Websites
2/4/2020 New ransomware targets industrial control systems
2/3/2020 Three principles regarding encryption you need to keep in mind
January 2020
Article Date Article Title
1/29/2020 Number of Botnet Command & Control Servers Soared in 2019
1/29/2020 Why Companies Should Care about Data Privacy Day
1/28/2020 Data breach: Why it’s time to adopt a risk-based approach to cybersecurity
1/28/2020 52% of companies use cloud services that have experienced a breach
1/24/2020 Over half of organizations were successfully phished in 2019
1/22/2020 Big Microsoft data breach – 250 million records exposed
1/21/2020 Ransomware Upgrades with Credential-Stealing Tricks
1/21/2020 New Study Finds Cost of Cyberattacks Soaring in Florida
1/16/2020 Active Directory Needs an Update: Here's Why
1/15/2019 Why Firewalls Aren't Going Anywhere
1/15/2020 Cyber attackers turn to business disruption as primary attack objective
1/14/2020 A 101 guide to mobile device management
1/14/2020 Windows 7 computers will no longer be patched after today
1/7/2020 Texas Department of Agriculture Website Briefly Defaced
December 2019
Article Date Article Title
12/30/2019 6 CISO New Year's Resolutions for 2020
12/23/2019 20 Vulnerabilities to Prioritize Patching Before 2020
12/19/2019 Hardware hacks: The next generation of cybercrime
12/18/2019 Few Firms Use Segmentation, Despite Security Benefits
12/18/2019 5 Security Resolutions to Prevent a Ransomware Attack in 2020
12/16/2019 The privacy and security trends that will shape 2020
12/16/2019 Ransomware 'Crisis' in US Schools: More Than 1,000 Hit So Far in 2019
12/13/2019 Lessons Learned from 7 Big Breaches in 2019
12/13/2019 As malware and network attacks increase in 2019, zero day malware accounts for 50% of detections
12/12/2019 Waking Up to Third-Party Security Risk
12/11/2019 Only Half of Malware Caught by Signature AV
12/10/2019 BYOD security challenges leave companies at risk
12/10/2019 Security 101: What Is a Man-in-the-Middle Attack?
12/10/2019 Deliver a Deadly Counterpunch to Ransomware Attacks: 4 Steps
12/9/2019 Networking attack gives hijackers VPN access
12/2/2019 How Widespread Identity Theft Has Gone Mainstream
November 2019
Article Date Article Title
11/22/2019 8 Shopping Tips for the Holiday Season
11/21/2019 The 'Department of No': Why CISOs Need to Cultivate a Middle Way
11/20/2019 Why Multifactor Authentication Is Now a Hacker Target
11/18/2019 Ransomware Again Strikes Louisiana, Forcing Server Shutdowns
11/15/2019 IT professionals deem hybrid cloud as most secure
11/15/2019 How You’re Affected by Data Breaches
11/14/2019 Network complexity and lack of visibility contribute to misconfigurations and increased risk
11/14/2019 5,183 breaches from the first nine months of 2019 exposed 7.9 billion records
11/13/2019 Better Together: How Pen Testing Helps Take Vulnerability Assessments to the Next Level
11/13/2019 Cybersecurity: An Organizationwide Responsibility
11/13/2019 State and Local Governments Face Iranian Hacking Threats
11/13/2019 The Ripple Effect of Data Breaches: How Damage Spreads
11/13/2019 Researchers discover massive increase in Emotet activity
11/8/2019 9 Principles to Simplify Security
11/8/2019 Cybersecurity workforce skills gap rises to over 4 million
11/7/2019 5 factors to consider when choosing an encryption key management system
11/7/2019 Phishing attacks at highest level in three years
11/7/2019 Cybercriminals are testing exposed credentials for future account takeover attacks
11/6/2019 How Transparent Should Government Be After a Cyberattack?
11/6/2019 Who is responsible for Active Directory security within your organization?
11/4/2019 Officials in New Jersey Reluctant to Publicize Cyberattacks
11/3/2019 How to Safely Shop Online This Holiday Season
October 2019
Article Date Article Title
10/30/2019 8 Trends in Vulnerability and Patch Management
10/30/2019 Examining security process maturity in 400 organizations
10/30/2019 Security Pros Fear Insider Attacks Stem from Cloud Apps
10/30/2019 As Phishing Kits Evolve, Their Lifespans Shorten
10/26/2019 Where Next After National Cyber Security Awareness Month?
10/24/2019 Eight-Hour DDoS Attack Struck AWS Customers
10/24/2019 Top five tips for building smarter enterprise security
10/23/2019 How to remove human error from the cyber risk equation
10/23/2019 A data breach could be game over for a brand
10/22/2019 3 Key Questions to Help Address Enterprise IoT Security Risks
10/22/2019 About 50% of Apps Are Accruing Unaddressed Vulnerabilities
10/22/2019 How Much Security Is Enough? Practitioners Weigh In
10/22/2019 Autoclerk Database Spills 179GB of Customer, US Government Data
10/21/2019 Deepfakes and voice as the next data breach
10/21/2019 Avast breached by hackers who wanted to compromise CCleaner again
10/18/2019 Tennessee Cybersecurity Unit Checks 1 Billion Threats Daily
10/18/2019 Managing Software Updates Still a Government Stumbling Block
10/16/2019 How to Build a Rock-Solid Cybersecurity Culture
10/14/2019 When Using Cloud, Paranoia Can Pay Off
10/13/2019 Book Review: 'Cybersecurity Is Everybody’s Business'
10/11/2019 FBI: Phishing Can Defeat Two-Factor Authentication
10/11/2019 7 SMB Security Tips That Will Keep Your Company Safe
10/11/2019 11 steps organizations should take to improve their incident response strategy
10/9/2019 A Realistic Threat Model for the Masses
10/9/2019 Workers Pose the Biggest Cybersecurity Threat, Report Says
10/8/2019 Glitching: The Hardware Attack That Can Disrupt Secure Software
10/3/2019 Good cybersecurity comes from focusing on the right things, but what are they?
10/3/2019 Ransomware Hampers Operations for Public Hospital System
September 2019
Article Date Article Title
9/27/2019 No Data Lost in Virus Attack on Maine State Networks
9/26/2019 Ransomware Hits Multiple, Older Vulnerabilities
9/25/2019 Older vulnerabilities and those with lower severity scores still being exploited by ransomware
9/25/2019 Web Attacks Focus on SQL Injection, Malware on Credentials
9/20/2019 Ransomware Strikes 49 School Districts & Colleges in 2019
9/20/2019 Cybersecurity Tips for K-12 Kids, Family, and Friends
9/18/2019 How Cybercriminals Exploit Simple Human Mistakes
9/9/2019 More Than 99% of Cyberattacks Need Victims' Help
9/9/2019 Cybersecurity issues can’t be solved by simply buying a product
9/6/2019 Hackers get $4.2 million from Oklahoma pension fund for retired troopers, state agents
9/5/2019 It's Not Healthy to Confuse Compliance with Security
9/4/2019 City Leaders Must Realize the Value of Cybersecurity (Opinion)
9/3/2019 Recent ransomware surge linked to Russian criminal group
August 2019
Article Date Article Title
8/27/2019 Loss of Windows 7 Support Leads to $1M Upgrades for Maine
8/202019 5 Ways to Improve the Patching Process
8/25/2019 Lessons Learned from Federal Agency Cybersecurity Projects
8/19/2019 Modern Technology, Modern Mistakes
8/19/2019 Towns Across Texas Hit in Coordinated Ransomware Attack
8/15/2019 7 Biggest Cloud Security Blind Spots
8/15/2019 More Than 20 Data Breaches Reported Per Day in First Half of 2019
8/12/2019 Why School Systems? The Rise of Ransomware in Public Schools
8/7/2019 Data Breach Exposes Personal Info for 53,000 Illinois Students
8/5/2019 Ransomware, “wiper” malware attacks have more than doubled, IBM team says
8/5/2019 Capital One Breach Latest Example of Cybersecurity Realities
July 2019
Article Date Article Title
7/30/2019 Insecure Real-Time Video Protocols Allow Hollywood-Style Hacking
7/29/2019 9 Things That Don't Worry You Today (But Should)
7/29/2019 4 Network Security Mistakes Bound to Bite You
7/29/2019 Capital One Says Breach Hit 100 Million Individuals in U.S.
7/29/2019 Georgia Public Safety Agency Hit with Ransomware Attack
7/24/2019 The Commoditization of Multistage Malware Attacks
7/23/2019 Penetration Test Data Shows Risk to Domain Admin Credentials
7/23/2019 Business Email Compromise: Thinking Beyond Wire Transfers
7/23/2019 Thwart the pressing threat of RDP password attacks
7/22/2019 How Cybercriminals Break into the Microsoft Cloud
7/18/2019 True passwordless authentication is still quite a while away
7/12/2019 Cybersecurity Frameworks - Types, Strategies, Implementation and Benefits
7/12/2019 Back to Basics with Log Management, SIEMs & MSSPs
7/11/2019 Prioritizing security efforts is key to data security in the cloud
7/11/2019 More than 2 million cyber incidents in 2018 created $45 billion in losses
7/9/2019 Taking hybrid cloud security to the next level
7/9/2019 Marriott Faces $124 Million GDPR Fine in UK
7/8/2019 7 Hot Cybersecurity Trends to Be Highlighted at Black Hat
7/8/2019 Maryland Grapples with Exposure of 78K Personal Records
7/8/2019 Post-Data Breach, British Airways Slapped With Record $230M Fine
7/1/2019 As Privacy Concerns Grow, States Create Bold Policies
7/1/2019 Ransomware Hits Georgia Court System
June 2019
Article Date Article Title
6/28/2019 Cloud Provider PCM Suffers Data Breach
6/26/2019 Cloud security exacerbated by immature security practices
6/26/2019 New Linux Worm Attacks IoT Devices
6/25/2019 Despite Cyber-Risks, Federal Agencies Are Not Taking Action
6/25/2019 Companies on Watch After US, Iran Claim Cyberattacks
6/20/2019 Florida Town Pays $600K to Ransomware Operators
6/17/2019 Human error still the cause of many data breaches
6/17/2019 A Spate of University Breaches Highlight Email Threats in Higher Ed
6/13/2019 SQL Injection Attacks Represent Two-Third of All Web App Attacks
6/12/2019 Predicting Vulnerability Weaponization
6/10/2019 Cognitive Bias Can Hamper Security Decisions
6/7/2019 What’s the best approach to patching vulnerabilities?
6/7/2019 Vulnerability Found in Millions of Email Systems
6/6/2019 Inside the Criminal Businesses Built to Target Enterprises
6/4/2019 Carbanak Attack: Two Hours to Total Compromise
6/3/2019 Baltimore Ransomware Attacker Was Behind Now-Suspended Twitter Account
6/3/2019 Microsoft Urges Businesses to Patch 'BlueKeep' Flaw
6/2/2019 Ransomware: Who’s to Blame or Not to Blame in Baltimore Attack?