​​​​​​​​​​​​​​​​​​​​​​

ITS Services

We partner with our customers and private sector companies to optimize the use of information technology resources for enhanced delivery of government services. ITS understands technology is the driving force behind your daily operations and we offer a full range of solutions designed to put technology to work for you.

​​​​​​​​​​

Security News & Events

Events


News Briefs

The links below are news articles regarding state and local cybersecurity. These links are provided for informational purposes only and as a service to our visitors. It is the responsibility of the visitor to evaluate the content and usefulness of information obtained from these external sites. Once a visitor leaves the Mississippi Department of ITS web site and links to an external site, our web site policies are no longer applicable and the visitor will be subject to the new site's policies. Any problems, concerns or issues with these external sites should be directed to the site administrator or webmaster of those sites.

Date Event
4/13/2019 BSides Nashville - Nashville, Tennessee
5/3/2019 BSides Knoxville - Knoxville, Tennessee
5/19/2019 SANS New Orleans 2019 - New Orleans, Louisiana - May 19-24
6/4/2019 National Cyber Summit - Huntsville, Alabama - June 4-6
7/14/2019 International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS) - Atlanta, Georgia - July 14-17
March 2019
Article Date Article Title
3/22/2019 Identity and Access Management: Who Are We Online?
3/15/2019 How to Spot and Avoid Common Scams
3/8/2019 Citrix Hacked by 'International Cybercriminals'
3/1/2019 Encryption Offers Safe Haven for Criminals and Malware
3/1/2019 Security Experts, Not Users, Are the Weakest Link
February 2019
Article Date Article Title
2/28/2019 Phishing, software supply chain attacks greatest threats for businesses
2/28/2019 Privileged credential abuse is involved in 74% of data breaches
2/27/2019 Persistent Attackers Rarely Use Bespoke Malware
2/27/2019 Consumer attitudes towards security breaches are changing significantly
2/26/2019 Attackers Continue to Focus on Users, Well-Worn Techniques
2/26/2019 Social Media Platforms Double as Major Malware Distribution Centers
2/25/2019 Businesses believe they should be patching their Android devices more frequently
2/25/2019 New Vulnerabilities Make RDP Risks Far from Remote
2/25/2019 TurboTax Hit with Credential Stuffing Attack, Tax Returns Compromised
2/23/2019 Why Many Organizations Still Don't Understand Security
2/22/2019 To Mitigate Advanced Threats, Put People Ahead of Tech
2/22/2019 New Legislation Builds on California Data Breach Law
2/22/2019 New Malware Campaign Targets Job Seekers
2/22/2019 New Malware Campaign Targets Job Seekers
2/21/2019 How are businesses facing the cybersecurity challenges of increasing cloud adoption?
2/21/2019 Formjacking is the new get rich quick scheme for cybercriminals
2/21/2019 Researchers Propose New Approach to Address Online Password-Guessing Attacks
2/20/2019 The Anatomy of a Lazy Phish
2/20/2019 As Businesses Move Critical Data to Cloud, Security Risks Abound
2/20/2019 Phishers’ new trick for bypassing email URL filters
2/20/2019 Flawed password managers allow malware to steal passwords from computer memory
2/19/2019 Breach in Stanford System Exposes Student Records
2/19/2019 19 Minutes to Escalation: Russian Hackers Move the Fastest
2/18/2019 Privacy Ops: The New Nexus for CISOs & DPOs
2/18/2019 2018 saw 6,515 reported breaches, exposing 5 billion sensitive records
2/14/2019 Challenges, risks & costs of securing cloud technology
2/14/2019 NIST Cybersecurity Framework: Five years later
2/13/2019 Lessons Learned from a Hard-Hitting Security Review
2/13/2019 SMBs spending a day each week dealing with cybersecurity issues
2/12/2019 Cybersecurity and the Human Element: We're All Fallible
2/12/2019 Staying Safe from Tax Scams
2/11/2019 Average DDoS attack volumes grew by 194% in 12 months
2/10/2019 To Understand IoT Security: Look to the Clouds
2/8/2019 6 Reasons to Be Wary of Encryption in Your Enterprise
2/8/2019 Infosec pros believe data isn’t secure in the cloud, despite desire for mass adoption
2/8/2019 Cybersecurity in 2019: A Time for Bigger Budgets and More Talent (Contributed)
2/8/2019 Malware Campaign Hides Ransomware in Super Mario Wrapper
2/8/2019 Rubrik Data Leak is Another Cloud Misconfiguration Horror Story
2/8/2019 Suspicion falls on China after cyber attack on Australian Parliament — and it's not surprising
2/8/2019 Student gets creative with data accidentally blasted out by university
2/8/2019 New Zombie 'POODLE' Attack Bred from TLS Flaw
2/6/2019 7 Tips for Communicating with the Board
2/4/2019 Four differences between the GDPR and the CCPA
2/4/2019 Is Your VPN Secure?
January 2019
Article Date Article Title
1/30/2019 Enterprises are struggling with cloud complexity and security
1/29/2019 Remote Access & the Diminishing Security Perimeter
1/28/2019 Should Washington State Embrace European-Style Privacy Laws?
1/24/2019 January 28th is National Data Privacy Day
1/24/2019 How Government Procurement Can Foster Private Sector Cybersecurity
1/24/2019 Why Cybersecurity Must Be a Top Priority for Small & Midsize Businesses
1/23/2019 Enterprise Malware Detections Up 79% as Attackers Refocus
1/23/2019 The Evolution of SIEM
1/23/2019 Should enterprises delay efforts to remediate most vulnerabilities?
1/21/2019 Shadow IT, IaaS & the Security Imperative
1/21/2019 Beware the man in the cloud: How to protect against a new breed of cyberattack
1/21/2019 Bug in widespread Wi-Fi chipset firmware can lead to zero-click code execution
1/18/2019 Baltimore Orders Security Review After Potential Staff Hack
1/17/2019 Encryption is key to protecting information as it travels outside the network
1/17/2019 773 million records exposed in massive data breach
1/17/2019 The Security Perimeter Is Dead; Long Live the New Endpoint Perimeter
1/17/2019 New Attacks Target Recent PHP Framework Vulnerability
1/16/2019 Millions of Oklahoma Gov Files Exposed by Wide-Open Server
1/15/2019 3 Key Metrics in Cyber Risk Analytics
1/15/2019 Why Cyberattacks Are the No. 1 Risk
1/14/2019 Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
1/14/2019 Advanced Phishing Scenarios You Will Most Likely Encounter This Year
1/11/2019 BEC-style attacks exploded in Q4 2018
1/11/2019 Who Takes Responsibility for Cyberattacks in the Cloud?
1/10/2019 Hackers Using Zero-Width Spaces to Bypass MS Office 35 Protection
1/9/2019 6 Ways to Beat Back BEC Attacks
1/9/2019 Security Concerns Limit Remote Work Opportunities
1/9/2019 Web Vulnerabilities Up, IoT Flaws Down
1/8/2019 The rising importance of Data Loss Prevention in today’s data protection landscape
1/8/2019 New 'Crypto Dusting' Attack Gives Cash, Takes Reputation
1/7/2019 Stronger DNS Security Stymies Would-Be Criminals
1/3/2019 Apple Phone Phishing Scams Getting Better
1/2/2019 AI in Security Carries as Many Questions as Answers
1/2/2019 Cyberattack Halts Publication for US Newspapers
December 2018
Article Date Article Title
12/30/2018 School district fails to reclaim $120,000 wired by bank to scammer
12/21/2018 7 Business Metrics Security Pros Need to Know
12/21/2018 Amazon Slip-Up Shows How Much Alexa Really Knows
12/20/2018 The benefits and limitations of AI in cybersecurity
12/20/2018 Hackers Bypass Gmail, Yahoo 2FA at Scale
12/18/2018 Warding off security vulnerabilities with centralized data
12/18/2018 Hackers have become increasingly deft at stealing student data
12/19/2018 How to Remotely Brick a Server
12/17/2018 The Dark Web: Is Your Agency at Risk? (Contributed)
12/17/2018 Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow
12/17/2018 Equifax: A study in accountability but not authority responsibility
12/17/2018 Cybercrime gangs continue to innovate to hide their crimes
12/17/2018 US ballistic missile systems have very poor cyber-security
12/17/2018 53 Bugs in 50 Days: Researchers Fuzz Adobe Reader​
12/17/2018 CrowdStrike: More Organizations Now Self-Detect Their Own Cyberattacks
12/14/2018 Most concerning security controls for cyberattackers? Deception and IDS
12/14/2018 Security and Privacy in the Connected Home
12/13/2018 Despite Breaches, Many Organizations Struggle to Quantify Cyber-Risks to Business /a>
12/13/2018 Universities Get Schooled by Hackers /a>
12/12/2018 Forget Shifting Security Left; It's Time to Race Left
12/12/2018 Securing and managing the enterprise Internet of Things
12/11/2018 49% of Cloud Databases Left Unencrypted
12/11/2018 Equifax Breach Underscores Need for Accountability, Simpler Architectures
12/11/2018 CrowdStrike: More Organizations Now Self-Detect Their Own Cyberattacks
12/11/2018 The Grinch Bot Before Christmas: A Security Story for the Holidays
12/10/2018 'Highly Active' Seedworm Group Hits IT Services, Governments
12/10/2018 6 CISO Resolutions for 2019
12/7/2018 Cybercrime Damages $6 Trillion By 2021
12/7/2018 The Year in Security 2018
12/7/2018 Old and new OpenSSH backdoors threaten Linux servers
12/6/2018 7 Common Breach Disclosure Mistakes
12/4/2018 5 Emerging Trends in Cybercrime
12/3/2018 Citrix security boss warns that cryptojackers are exploiting cloud ignorance
12/3/2018 YouTuber PewDiePie Promoted Via 50K Hacked Printers​
November 2018
Article Date Article Title
11/30/2018 Holiday Hacks: 6 Cyberthreats to Watch Right Now​
11/30/2018 FBI Arrests Student, Employee in University Hacking Case
11/30/2018 57m Americans’ details leaked online by another misconfigured server
11/30/2018 Massive Starwood Hotels Breach Hits 500 Million Guests
11/29/2018 Establishing True Trust in a Zero-Trust World
11/28/2018 Data Breach Threats Bigger Than Ever
11/28/2018 Why compliance is never enough
11/28/2018 Take cybersecurity into your own hands: Don’t rely on tech giants
11/28/2018 2.56M Users Potentially Affected in N.C. Health-Care Breach
11/28/2018 Incorrect Assessments of Data Value Putting Organizations at Risk
11/27/2018 8 Tips for Preventing Credential Theft Attacks on Critical Infrastructure
11/27/2018 Who's the Weakest Link in Your Supply Chain?
11/26/2018 GDPR’s impact: The first six months
11/26/2018 Ransomware Attack Forced Ohio Hospital System to Divert ER Patients
11/26/2018 Internal negligence to blame for most data breaches involving personal health information
11/26/2018 Russia Linked Group Resurfaces With Large-Scale Phishing Campaign
11/21/2018 The state of BYOD and mobile device security
11/21/2018 Amazon Low-Key Reveals Breach of Some Customer Data
11/21/2018 Mirai Evolves From IoT Devices to Linux Servers
11/21/2018 Conficker: A 10-year retrospective on a legendary worm
11/20/2018 Cybersecurity at the Core
11/20/2018 Hackers Target Defense Community Through Impersonation
11/20/2018 ‘Good Actors’ Call for Reasonable Federal Privacy Law
11/20/2018 Staying Secure While Shopping Online
11/20/2018 6,500 Dark Web Sites Offline After Hosting Service Attacked
11/20/2018 $1B Department of Defense Audit Stresses Cybersecurity Failings
11/19/2018 Missing Flash Drive Sparks Security Concerns in Amarillo, Texas
11/16/2018 95% of Organizations Have Cultural Issues Around Cybersecurity
11/16/2018 Law firms are increasingly investing in cybersecurity programs
11/15/2018 Blockchain Like Using Sledgehammer on a Thumb Tack (Radio)
11/15/2018 Online shopping fraud to surge during Black Friday and Cyber Monday
11/14/2018 Phishing Attack Exposes Patient Records in Washington
11/14/2018 Small-Time Cybercriminals Landing Steady Low Blows
11/13/2018 RIP, 'IT Security'
11/12/2018 What is ‘smishing’?
11/5/2018 Passwords: Here to Stay, Despite Smart Alternatives?
11/5/2018 After the Breach: Tracing the 'Smoking Gun'
11/2/2018 Tackling Cybersecurity from the Inside Out
11/1/2018 30 Years Ago, the World’s First Cyberattack Set the Stage for Modern Cybersecurity Challenges
October 2018
Article Date Article Title
10/31/2018 A Washington ISP exposed the ‘keys to the kingdom’ after leaving a server unsecured
10/31/2018 Spooking the C-Suite: The Ephemeral Specter of Third-Party Cyber-Risk
10/31/2018 Emotet Awakens With New Campaign of Mass Email Exfiltration
10/31/2018 Financial Sector Data Breaches Soar Despite Heavy Security Spending
10/30/2018 21% of all files in the cloud contain sensitive data
10/29/2018 How to protect your organization from insider threats, the #1 risk for data loss
10/29/2018 Five Lessons from Russia's Cyber Meddling (Contributed)
10/29/2018 AppSec Is Dead, but Software Security Is Alive & Well
10/29/2018 How to protect your organization from insider threats, the #1 risk for data loss
10/29/2018 Word documents seemingly carrying videos can deliver malicious code instead
10/24/2018 How science can fight insider threats
10/24/2018 Supermarket Told it Must Compensate 100,000 Workers after Payroll Data Deliberately Leaked by Rogue Employee
10/23/2018 Serverless botnets could soon become reality
10/22/2018 Security budgets are rising, but is it enough?
10/18/2018 Solving the cloud infrastructure misconfiguration problem
10/18/2018 Audits: The Missing Layer in Cybersecurity
10/18/2018 IT and security professionals unprepared for Windows 7 end of life
10/18/2018 Knowing how to define, screen and monitor your third parties is essential to minimizing risk
10/17/2018 Protecting applications from malicious scripts
10/17/2018 Endpoint security solutions challenged by zero-day and fileless attacks
10/15/2018 Hackers steal Pentagon personnel’s PI and credit card data
10/15/2018 4 Ways to Fight the Email Security Threat
10/14/2018 Security Audit Weaknesses Offer a Silver Lining
10/12/2018 12 Free, Ready-to-Use Security Tools
10/12/2018 Securing campus networks became more challenging
10/10/2018 Mitigating the risk of Office 365 account hijacking
10/10/2018 Privileged account practices are poor, and IT security teams know it
10/8/2018 Teach Your AI Well: A Potential New Bottleneck for Cybersecurity
10/5/2018 Most enterprises highly vulnerable to security events caused by cloud misconfiguration
10/5/2018 Identity fraudsters are getting better and better at what they do
10/4/2018 Most organizations believe hackers can penetrate their network
10/4/2018 China allegedly infiltrated US companies through implanted hardware backdoors
10/3/2018 What is the future of authentication? Hint: It’s not passwords, passphrases or MFA
10/2/2018 CISOs: How to Answer the 5 Questions Boards Will Ask You
10/2/2018 Privileged account practices are poor, and IT security teams know it
10/2/2018 Adobe fixes 47 critical flaws in Acrobat and Reader
10/1/2018 Python-based attack tools are the most common vector for launching exploit attempts
​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​