State of Wyoming Office of Cybersecurity

Rawlins Cybersecurity Event Follow Up 2-28-24.pdf

Collaboration is a crucial aspect of cybersecurity!

Our team set an excellent example by sharing their expertise and assisting other teams during a cyberinfrastructure breach in the City of Rawlins. 

Their proactive involvement, technical understanding, and teamwork helped mitigate the threat quickly and minimize potential damages. 

This commendation letter is a testament to our team's unwavering dedication to protecting our state and its citizens.

Phight the Phish!

If a link looks a little off, think before you click it. That link could be an attempt to get sensitive information or install malware on your machine. Phishing is one of the most common types of malware and people often fall victim to these attacks. 

If you are a state employee, you can use the orange hook at the top of your email to report suspicious information. Our team of dedicated cyber-experts can investigate and let you know if it is safe!

It could be a text message or even a phone call. They may pretend to be your email service, your boss, your bank, a friend...The message may claim it needs your information because you’ve been a victim of cybercrime. 

And they may try to get you to run malicious software, also known as malware. Sadly, we are more likely to fall for phishing than we think.   

If it’s a link you don’t recognize, trust your instincts and think before you click. We all need to Phight the Phish! 

To learn more about avoiding phishing and social engineering attempts visit

Use MFA Today!

Even if you have a complex password, “hackers” can still use computers and other digital devices to gain unauthorized access to information or damage your computer systems. 

Industry is taking a second step towards identifying yourself in your accounts. Multi-Factor Authentication (MFA) is FREE, takes a few minutes to enable, and only seconds to use. MFA uses two steps to authenticate that you are who you say you are. 

If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring. 

Government Agency Resources

Cybersecurity for Everyone


High School


Online Safety

Stay Safe During Tax Season

Seniors Online Safety Tips

2023 Cybersecurity
Awareness Month