Enterprise Security
We encourage you to report any activities that you feel meet the criteria for an incident. Our policy is to keep any information specific to your site confidential unless we receive your permission to release that information.
Definition of an Information System Security or Cyber Incident
Enterprise Technology Services defines information system security or cyber incident as any event violating State of Wyoming security policy, standards, procedures, guidelines, processes or best practice that may be detected as unexplained network or system behavior resulting in the loss of sensitive data or any instance where State of Wyoming's reputation might suffer.
These incidents are segmented intocategories consistent with definitions published by the National Institute of Standards & Technology (NIST).
Enterprise Endpoint Security
(Core Service)
(Core Service)
Endpoint security software prevents, detects, and removes malware, including viruses, worms and spyware from user devices.
IT Vulnerability Assessment
(Enhanced Service)
(Enhanced Service)
ETS can assist State agencies to identify vulnerabilities that may affect their IT systems. This may involve ETS being the technical team or assisting the agency working with an external 3rd party.
Secure Socket Layer (SSL/TLS) Certificates (Enhanced Service)
SSL/TLS Certificates establish a secure encrypted connection between a browser (user’s computer) and a server (website).
Enterprise Security
(Core Service)
Enterprise security consists of policies, network hardware and software provisions monitoring and
preventing unauthorized access, misuse, modification, or denial of a computer network and
network-accessible resources;
Payment Card Industry (PCI) Compliance (Enhanced Service)
PCI Assessment, Customer Compliance Portal, PCI Report on Compliance