ITS Services

We partner with our customers and private sector companies to optimize the use of information technology resources for enhanced delivery of government services. ITS understands technology is the driving force behind your daily operations and we offer a full range of solutions designed to put technology to work for you.


The tips provided below are helpful in reinforcing cybersecurity awareness and best practices.​

Cyber Security Highlights

September 2022

Update and Patch all Systems and Software:
Ensure your applications and operating systems (OSs) have been updated with the latest patches. Vulnerable applications and OSs are the target of most ransomware attacks.

Avoid Using Public Wi-Fi:
Unsecured public Wi-Fi may allow an attacker to intercept your device’s network traffic and gain access to your personal information.

August 2022

Monitor Accounts:
Look for any unauthorized use of, or unusual activity on your user accounts. If you identify unauthorized or unusual activity, contact your account provider immediately.

Install or enable a firewall:
Firewalls can help protect your IT environment by blocking malicious traffic before it enters your network or computer. Some operating systems include a firewall; if the operating system you are using includes one, enable it.

July 2022

Keep software updated:
Install software patches on your computer so attackers do not take advantage of known vulnerabilities. Consider enabling automatic updates, when available.

Back up data:
Regularly back up your data (documents, photos, email messages, etc.) to an external destination (external hard drive, cloud storage, etc.) In the event of an infection, your information will not be lost.

June 2022

Change Your passwords:
Have separate passwords for every account. At a minimum, separate your work and personal accounts and make sure that your critical accounts have the strongest passwords. If you believe your device is infected or one of your accounts have been compromised, change your password immediately. Create and use strong passwords, making them difficult for attackers to guess.

Lock Your Devices:
Before you travel, lock your device. Set your devices to lock after a period of time and use strong PINs and strong passwords.

May 2022

Disable external media AutoRun and AutoPlay features.
Disabling AutoRun and AutoPlay features prevents external media infected with malicious code from automatically running on your computer. 

Use Accounts with Limited Permissions:
Using accounts with restricted permissions helps prevent malicious code from spreading and escalating to an administrative account.

April 2022

Block Pop-Up Advertisements:
Pop-up blockers disable windows that could potentially contain malware. Most web browsers have a free feature that can be enabled to block pop-up advertisements.

March 2022

Install and Maintain Antivirus Software:
Antivirus software recognizes malware and helps protect your computer against it. Installing antivirus software from a reputable vendor is an important step in preventing and detecting infections. Always visit vendor sites directly rather than clicking on advertisements or email links. For the best protection against newly discovered malware, it is important to keep your antivirus software up-to-date. 

Use Protection Tools:
Install antivirus software, firewalls, and email filters—and keep them updated—to reduce malicious network traffic. 

February 2022

Stay Informed:
Be aware of recent cybersecurity threats and remain up to date on ransomware techniques. You can find information about known phishing attacks on the Anti-Phishing Working Group website. You may also want to sign up to cybersecurity groups, which will provide updates on new Alerts, Analysis Reports, Bulletins, Current Activities, or Tips.

Verify Email Senders:
If you are unsure whether or not an email is legitimate, try to verify the email's legitimacy by contacting the sender directly. Do not click on any links in the email. If possible, use a previous (legitimate) email to ensure the contact information you have for the sender is authentic before you contact them. 

January 2022

Data Privacy Day:
Held annually on January 28th, Data Privacy Day aims to increase awareness of privacy and data protection issues among consumers, organizations, and government officials. Read More

Keep Your Personal Information Safe:
Check a website's security to ensure the information you submit is encrypted before you provide it. Look for web addresses with "https://", which means the site takes extra measures to help secure your information. "https://" is "http://" with encryption implemented and as such, is far more secure than "http://".

December 2021

Open Email Attachments with Caution:
Be wary of opening email attachments, even from senders you think you know, particularly when attachments are compressed files or ZIP files.

Use Caution When Entering Website Addresses:
Pay attention to the website addresses you click on, as well as those you enter yourself. Malicious website addresses often appear almost identical to legitimate sites, often using a slight variation in spelling or a different domain (e.g., .com instead of .net).

November 2021

Use Caution with Links:
Be careful when clicking directly on links in emails, even if the sender appears to be someone you know. Attempt to independently verify website addresses (e.g., contact your organization's helpdesk, search the Internet for the sender's organization's website or the topic mentioned in the email).

Update and Patch All Systems and Software:
Ensure your applications and operating systems (OSs) have been updated with the latest patches. Vulnerable applications and OSs are the target of most cyberattacks.

Read more about cybersecurity awareness and best practices: