​​​​​​​​​​​​​​​​​​​​​​

ITS Services

We partner with our customers and private sector companies to optimize the use of information technology resources for enhanced delivery of government services. ITS understands technology is the driving force behind your daily operations and we offer a full range of solutions designed to put technology to work for you.

​​​​​​​​​​

Security News & Events

Events

Date Event
1/28/2019 Watch "A New Era in Privacy" live from LinkedIn, San Francisco

News Briefs

The links below are news articles regarding state and local cybersecurity. These links are provided for informational purposes only and as a service to our visitors. It is the responsibility of the visitor to evaluate the content and usefulness of information obtained from these external sites. Once a visitor leaves the Mississippi Department of ITS web site and links to an external site, our web site policies are no longer applicable and the visitor will be subject to the new site's policies. Any problems, concerns or issues with these external sites should be directed to the site administrator or webmaster of those sites.

January 2019
Article Date Article Title
1/3/2019 Apple Phone Phishing Scams Getting Better
December 2018
Article Date Article Title
12/30/2018 School district fails to reclaim $120,000 wired by bank to scammer
12/20/2018 Hackers Bypass Gmail, Yahoo 2FA at Scale
12/17/2018 Cybercrime gangs continue to innovate to hide their crimes
12/17/2018 US ballistic missile systems have very poor cyber-security
12/17/2018 53 Bugs in 50 Days: Researchers Fuzz Adobe Reader​
12/17/2018 CrowdStrike: More Organizations Now Self-Detect Their Own Cyberattacks
12/14/2018 Security and Privacy in the Connected Home
12/13/2018 Despite Breaches, Many Organizations Struggle to Quantify Cyber-Risks to Business /a>
12/13/2018 Universities Get Schooled by Hackers /a>
12/12/2018 Forget Shifting Security Left; It's Time to Race Left
12/12/2018 Securing and managing the enterprise Internet of Things
12/11/2018 49% of Cloud Databases Left Unencrypted
12/11/2018 Equifax Breach Underscores Need for Accountability, Simpler Architectures
12/11/2018 CrowdStrike: More Organizations Now Self-Detect Their Own Cyberattacks
12/11/2018 The Grinch Bot Before Christmas: A Security Story for the Holidays
12/10/2018 'Highly Active' Seedworm Group Hits IT Services, Governments
12/10/2018 6 CISO Resolutions for 2019
12/7/2018 Old and new OpenSSH backdoors threaten Linux servers
12/6/2018 7 Common Breach Disclosure Mistakes
12/4/2018 5 Emerging Trends in Cybercrime
12/3/2018 Citrix security boss warns that cryptojackers are exploiting cloud ignorance
12/3/2018 YouTuber PewDiePie Promoted Via 50K Hacked Printers​
November 2018
Article Date Article Title
11/30/2018 Holiday Hacks: 6 Cyberthreats to Watch Right Now​
11/30/2018 FBI Arrests Student, Employee in University Hacking Case
11/30/2018 57m Americans’ details leaked online by another misconfigured server
11/30/2018 Massive Starwood Hotels Breach Hits 500 Million Guests
11/29/2018 Establishing True Trust in a Zero-Trust World
11/28/2018 Data Breach Threats Bigger Than Ever
11/28/2018 Why compliance is never enough
11/28/2018 Take cybersecurity into your own hands: Don’t rely on tech giants
11/28/2018 2.56M Users Potentially Affected in N.C. Health-Care Breach
11/28/2018 Incorrect Assessments of Data Value Putting Organizations at Risk
11/27/2018 8 Tips for Preventing Credential Theft Attacks on Critical Infrastructure
11/27/2018 Who's the Weakest Link in Your Supply Chain?
11/26/2018 GDPR’s impact: The first six months
11/26/2018 Ransomware Attack Forced Ohio Hospital System to Divert ER Patients
11/26/2018 Internal negligence to blame for most data breaches involving personal health information
11/26/2018 Russia Linked Group Resurfaces With Large-Scale Phishing Campaign
11/21/2018 The state of BYOD and mobile device security
11/21/2018 Amazon Low-Key Reveals Breach of Some Customer Data
11/21/2018 Mirai Evolves From IoT Devices to Linux Servers
11/21/2018 Conficker: A 10-year retrospective on a legendary worm
11/20/2018 Cybersecurity at the Core
11/20/2018 Hackers Target Defense Community Through Impersonation
11/20/2018 ‘Good Actors’ Call for Reasonable Federal Privacy Law
11/20/2018 Staying Secure While Shopping Online
11/20/2018 6,500 Dark Web Sites Offline After Hosting Service Attacked
11/20/2018 $1B Department of Defense Audit Stresses Cybersecurity Failings
11/19/2018 Missing Flash Drive Sparks Security Concerns in Amarillo, Texas
11/16/2018 95% of Organizations Have Cultural Issues Around Cybersecurity
11/16/2018 Law firms are increasingly investing in cybersecurity programs
11/15/2018 Blockchain Like Using Sledgehammer on a Thumb Tack (Radio)
11/15/2018 Online shopping fraud to surge during Black Friday and Cyber Monday
11/14/2018 Phishing Attack Exposes Patient Records in Washington
11/14/2018 Small-Time Cybercriminals Landing Steady Low Blows
11/13/2018 RIP, 'IT Security'
11/12/2018 What is ‘smishing’?
11/5/2018 Passwords: Here to Stay, Despite Smart Alternatives?
11/5/2018 After the Breach: Tracing the 'Smoking Gun'
11/2/2018 Tackling Cybersecurity from the Inside Out
11/1/2018 30 Years Ago, the World’s First Cyberattack Set the Stage for Modern Cybersecurity Challenges
October 2018
Article Date Article Title
10/31/2018 A Washington ISP exposed the ‘keys to the kingdom’ after leaving a server unsecured
10/31/2018 Spooking the C-Suite: The Ephemeral Specter of Third-Party Cyber-Risk
10/31/2018 Emotet Awakens With New Campaign of Mass Email Exfiltration
10/31/2018 Financial Sector Data Breaches Soar Despite Heavy Security Spending
10/30/2018 21% of all files in the cloud contain sensitive data
10/29/2018 How to protect your organization from insider threats, the #1 risk for data loss
10/29/2018 Five Lessons from Russia's Cyber Meddling (Contributed)
10/29/2018 AppSec Is Dead, but Software Security Is Alive & Well
10/29/2018 How to protect your organization from insider threats, the #1 risk for data loss
10/29/2018 Word documents seemingly carrying videos can deliver malicious code instead
10/24/2018 How science can fight insider threats
10/24/2018 Supermarket Told it Must Compensate 100,000 Workers after Payroll Data Deliberately Leaked by Rogue Employee
10/23/2018 Serverless botnets could soon become reality
10/22/2018 Security budgets are rising, but is it enough?
10/18/2018 Solving the cloud infrastructure misconfiguration problem
10/18/2018 Audits: The Missing Layer in Cybersecurity
10/18/2018 IT and security professionals unprepared for Windows 7 end of life
10/18/2018 Knowing how to define, screen and monitor your third parties is essential to minimizing risk
10/17/2018 Protecting applications from malicious scripts
10/17/2018 Endpoint security solutions challenged by zero-day and fileless attacks
10/15/2018 Hackers steal Pentagon personnel’s PI and credit card data
10/15/2018 4 Ways to Fight the Email Security Threat
10/14/2018 Security Audit Weaknesses Offer a Silver Lining
10/12/2018 Securing campus networks became more challenging
10/10/2018 Mitigating the risk of Office 365 account hijacking
10/10/2018 Privileged account practices are poor, and IT security teams know it
10/8/2018 Teach Your AI Well: A Potential New Bottleneck for Cybersecurity
10/5/2018 Most enterprises highly vulnerable to security events caused by cloud misconfiguration
10/5/2018 Identity fraudsters are getting better and better at what they do
10/4/2018 Most organizations believe hackers can penetrate their network
10/4/2018 China allegedly infiltrated US companies through implanted hardware backdoors
10/3/2018 What is the future of authentication? Hint: It’s not passwords, passphrases or MFA
10/2/2018 CISOs: How to Answer the 5 Questions Boards Will Ask You
10/2/2018 Privileged account practices are poor, and IT security teams know it
10/2/2018 Adobe fixes 47 critical flaws in Acrobat and Reader
10/1/2018 Python-based attack tools are the most common vector for launching exploit attempts
September 2018
Article Date Article Title
9/28/2018 Big Facebook data breach: 50 million accounts affected
9/28/2018 Phorpiex bots target remote access servers to deliver ransomware
9/27/2018 Port of San Diego Falls Victim to Cyberattack
9/27/2018 Cybersecurity Researchers Spotted First-Ever UEFI Rootkit in the Wild
9/27/2018 Apple DEP vulnerability lets attackers access orgs’ resources, info
9/26/2018 New tactics subvert traditional security measures and strike organizations of all sizes
9/26/2018 USB Drives Remain Critical Cyberthreat
9/24/2018 What do you mean by storage encryption?
9/24/2018 How companies view their cyber exposure, and how they deal with it
9/21/2018 Massachusetts Auditor Faults State IoT Adoption Practices
9/21/2018 6 Security Training Hacks to Increase Cyber IQ Org-Wide
9/21/2018 Malicious hacking activity increasingly targeting critical infrastructure
9/21/2018 Security data reveals worldwide malicious login attempts are on the rise
9/21/2018 Security priorities are shifting in response to increased cybersecurity complexity
9/20/2018 Manipulation tactics that you fall for in phishing attacks
9/19/2018 8 Keys to a Successful Penetration Test
9/19/2018 Malicious hacking activity increasingly targeting critical infrastructure
9/19/2018 Your Business Should Be More Afraid of Phishing than Malware
9/18/2018 State Department scores an F on 2FA security
9/18/2018 Websites Attack Attempts Rose in Q2
9/18/2018 Popular Government Payment Solution Exposes 14M Records
9/17/2018 The 7 Habits of Highly Effective Security Teams
9/17/2018 RDP Ports Prove Hot Commodities on the Dark Web
9/16/2018 Amazon Investigates Employees Leaking Data for Bribes
9/14/2018 Analysis of half-a-billion emails reveals malware-less email attacks are on the rise
9/14/2018 Avoiding Many Types of Malware
9/13/2018 Phished credentials caused twice as many breaches than malware in the past year
9/12/2018 8 Cryptomining Malware Families to Keep on the Radar
9/12/2018 Creators of Tools for Building Malicious Office Docs Ditch Old Exploits
9/12/2018 Banking Trojan attacks increase, large scale Ramnit campaign impacts organizations worldwide
9/11/2018 Busting the VDI Security Myth
9/11/2018 The SIEM Process is as Powerful as the Product
9/10/2018 The Equifax Breach One Year Later: 6 Action Items for Security Pros
9/10/2018 APIs: The Trojan horses of security
9/10/2018 Three Trend Micro Apps Caught Collecting MacOS User Data
9/10/2018 Verizon details breaches they were called in to investigate
9/9/2018 Is More Tech Regulation Coming?
9/7/2018 Back to school: Lessons in endpoint security
9/7/2018 US government releases post-mortem report on Equifax hack
9/7/2018 How metrics can enhance the effectiveness of security programs
9/7/2018 8 Attack Vectors Puncturing Cloud Environments
9/6/2018 What Is Cybersecurity Situational Awareness And Why Should It Be A Critical Part Of Your Security Strategy?
9/6/2018 How leadership implements cyber resiliency across their organizations
9/4/2018 Colorado Takes Point with Demanding Data Protection Standards
9/4/2018 ThreatList: 60% of BEC Attacks Fly Under the Radar
9/4/2018 Less than a third of companies have dedicated cybersecurity insurance
9/3/2018 Boosting State Website Security
9/1/2018 New Guide on State Data Breach Laws
August 2018
Article Date Article Title
8/31/2018 How Hackers Hit Printers
8/31/2018 Kansas County Fortifies Its Defenses After Failed Cyberattacks
8/30/2018 Cryptocurrency Scams Replacing Ransomware as Attackers' Fave
8/28/2018 Cyber attackers switching to covert tactics
8/24/2018 6.4 billion fake emails sent every day
8/24/2018 Nearly half of businesses suffered an unrecoverable data event in the last three years
8/23/2018 ThreatList: $1.1M is Lost to Cybercrime Every Minute of Every Day
8/23/2018 Who owns application security?
8/23/2018 Million of Texas voter records exposed online /a>
8/22/2018 The single sign-on account hijacking threat and what can we do about it?
8/21/2018 Proving ROI: How a Security Road Map Can Sway the C-Suite
8/21/2018 Hackers Use Public Cloud Features to Breach, Persist In Business Networks
8/21/2018 7 Serious IoT Vulnerabilities
8/21/2018 Cybersecurity: States ramp up election protections ahead of midterms with $380 million in federal funds
8/20/2018 Don’t sleep on laptop security, safeguard your data
8/17/2018 Apple gets cored: 90GB of ‘secure files’ stolen by high schooler
8/17/2018 Telecom services: Patient zero for email-based attacks?
8/16/2018 Cloud computing remains top emerging business risk
8/16/2018 2.6 billion records exposed in 2,300 disclosed breaches so far this year
8/15/2018 New Office 365 phishing attack uses malicious links in SharePoint documents​
8/14/2018 Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw
8/13/2018 Security’s bane: The false positive
8/13/2018 When Every Risk Is “Medium”
8/13/2018 Criminals can compromise company networks by sending malicious faxes
8/13/2018 FBI Warns of Cyber Extortion Scam
8/10/2018 6 Eye-Raising Third-Party Breaches
8/9/2018 More Government Websites Encrypt as Google Chrome Warns Users Non-HTTPS Sites Are 'Not Secure'
8/9/2018 There’s a global divide in how organizations assess cyber risk
8/8/2018 5 Common Issues State Auditors See in Government IT Departments
8/8/2018 No, The Mafia Doesn't Own Cybercrime: Study
8/8/2018 Nearly 15% of US security budgets go to remediating active compromises
8/7/2018 Expect API Breaches to Accelerate
8/7/2018 Hashcat developer discovers simpler way to crack WPA2 wireless passwords
8/6/2018 Salesforce Customer Data Possibly Exposed in API Glitch
8/6/2018 Want to keep your data? Back it up!
8/6/2018 HP plugs critical RCE flaws in InkJet printers
8/3/2018 4 Reasons Why Companies Are Failing at Incident Response
8/2/2018 Do your users understand your cybersecurity policy?
8/1/2018 Password breach teaches Reddit that, yes, phone-based 2FA is that bad
​​​​​​​​​​​​​​​​​​​​​​​​