SECURING (INFORMATION SECURITY)
ITS administers the Enterprise Security Program to provide coordinated oversight of the cyber security efforts across all state agencies, including cybersecurity systems, services, and development of policies, standards, and guidelines.
When in doubt, throw it out:
Links in emails, social media posts, and online advertising are often how cybercriminals try to steal your personal information. Even if you know the source, if something looks suspicious, delete it. Read More
Twitch Leak Included Emails, Passwords in Clear Text: Researcher
A researcher combed through the Twitch leak and found what they said was evidence of PayPal chargebacks with names and emails; employees’ emails; and more. Read More
5 Steps to Securing Your Network Perimeter
Ekaterina Kilyusheva, head of the Information Security Analytics Research Group at Positive Technologies, offers a blueprint for locking up the fortress. Read More
What Are Some Red Flags in a Vendor Security Assessment?
The last thing you want is a vendor that lies to you about its security practices. Read More