Information Technology

Agency Focus
Analyze, coordinate, and implement information technology for Washington County

Program
The Information Technology Department provides the technology leadership, system implementation, and ongoing support for a broad range of technologies used by county departments to provide quality services to our citizens, visitors, and businesses. We provide to other Washington County departments services for analyzing, planning, coordinating, developing, and implementing computer software and hardware, as well as, providing continued training and technical assistance.

Types of Support Provided
  • Application Development, Implementation, Training, and Support Services
  • Infrastructure Development and Support Services
  • Enterprise Services
  • Administration and Security
  • Hardware Procurement, Implementation, and Support Services
  • User Community Help Desk
Stop. Think. Connect.
Stop. Think. Connect.™ is the global cyber-security awareness campaign to help all digital citizens stay safer and more secure online. The message was created by an unprecedented coalition of private companies, non-profits, and government organizations with leadership provided by the National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG). NCSA, in partnership with the APWG, continue to lead the campaign. The Department of Homeland Security leads the federal engagement in the campaign.

Cyber Security News

  1. Podcast: How Millions of Apps Leak Private Data

    Threatpost's Tom Spring talked to Roman Unuchek, senior malware analyst at Kaspersky Lab, about his discoveries this week at the RSA Conference.

    ThreatPost Cyber Seurity Information
  2. HackerOne CEO Talks Bug Bounty Programs at RSA Conference

    Can bug bounty programs be designed to protect consumer privacy and how do programs balance white hat disclosure versus companies sitting on vulnerabilities until they are fixed?

    ThreatPost Cyber Seurity Information
  3. IoT Security Concerns Peaking – With No End In Sight

    Despite numerous talks about IoT vulnerabilities at RSAC this week, a clear resolution on fixes is nowhere in sight.

    ThreatPost Cyber Seurity Information
  4. Cloud Credentials: New Attack Surface for Old Problem

    Researchers show why keeping a handle on user credentials is just as hard in the cloud as it is on local networks.

    ThreatPost Cyber Seurity Information
  5. Chris Vickery Discusses Data Leak of 48 Million Users by Private Intelligence Firm

    Private intelligence gathering firm LocalBlox leaked data on 48 million users that was scraped from Facebook, LinkedIn, Zillow and other sites.

    ThreatPost Cyber Seurity Information
  6. Use of ‘StegWare’ Increases in Stealth Malware Attacks

    Researchers are warning malware payloads can bypass traditional AV protection when delivered buried inside images, documents or even just a pixel.

    ThreatPost Cyber Seurity Information
View All

Did You Know?

What happens on the internet in one minute
Broadband Speed Test
You can help improve broadband speed in New York State by taking the broadband speed test.  Learn more about Broadband programs in New York State as well as the new Broadband For All Program.