Information Technology

Agency Focus
Analyze, coordinate, and implement information technology for Washington County

Program
The Information Technology Department provides the technology leadership, system implementation, and ongoing support for a broad range of technologies used by county departments to provide quality services to our citizens, visitors, and businesses. We provide to other Washington County departments services for analyzing, planning, coordinating, developing, and implementing computer software and hardware, as well as, providing continued training and technical assistance.

Types of Support Provided
  • Application Development, Implementation, Training, and Support Services
  • Infrastructure Development and Support Services
  • Enterprise Services
  • Administration and Security
  • Hardware Procurement, Implementation, and Support Services
  • User Community Help Desk
Stop. Think. Connect.
Stop. Think. Connect.™ is the global cyber-security awareness campaign to help all digital citizens stay safer and more secure online. The message was created by an unprecedented coalition of private companies, non-profits, and government organizations with leadership provided by the National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG). NCSA, in partnership with the APWG, continue to lead the campaign. The Department of Homeland Security leads the federal engagement in the campaign.

Cyber Security News

  1. App Flaws Allow Snoops to Spy On Tinder Users, Researchers Say

    The use of HTTP for photo transport and a flaw in Tinder's use of HTTPS can leave users exposed, Checkmarx says.

    ThreatPost Cyber Seurity Information
  2. Intel Halts Spectre/Meltdown Patching for Broadwell and Haswell Systems

    Widespread reports of reboot issues on some Intel systems force the chip giant to pump the brakes on rolling out patches for side-channel vulnerabilities.

    ThreatPost Cyber Seurity Information
  3. What is Malware

    Malware is software--a computer program--used to perform malicious actions. In fact, the term malware is a combination of the words malicious and software. Cyber criminals install malware on your computers or devices to gain control over them or gain...

  4. Popular Sonic the HedgeHog Apps at Risk of Leaking User Data to Unverified Servers

    Researchers have found three Sega game apps that connect to insecure servers and risk leaking user data.

    ThreatPost Cyber Seurity Information
  5. Secure Your Home Wi-Fi Router

    The most effective steps you can take to secure your wireless network at home is to change the default admin password, enable WPA2 encryption and use a strong password for your wireless network.

  6. Hacker Infects Gas Pumps with Code to Cheat Customers

    Russian authorities have broken up a crime ring involving a hacker and willing gas-station employees who have used malicious software to cheat customers of gas.

    ThreatPost Cyber Seurity Information
View All

Did You Know?

What happens on the internet in one minute
Broadband Speed Test
You can help improve broadband speed in New York State by taking the broadband speed test.  Learn more about Broadband programs in New York State as well as the new Broadband For All Program.