Enterprise Security

Request any of these services in just a few clicks!

We encourage you to report any activities that meet the criteria for an incident. 

Our policy is to keep any information specific to your site confidential unless we receive your permission to release that information.

Definition of an Information System Security or Cyber Incident

Enterprise Technology Services defines a cyber incident as an unexpected event that occurs with a computer system, such as a service suddenly stopping or not working. 

It can happen because of mistakes, accidents, or on purpose. This includes when rules about how computers should be used are broken or when someone tries to harm a computer system or the information inside it. 

Basically, it's when something goes wrong with computers, or someone does something bad with them.

Reporting a Security Incident or Concern

State Government
(Executive Branch Boards and Commissions)

Department of Enterprise Technology Services (ETS)
Customer Service Desk
Incident Portal:  https://wyoprod.servicenowservices.com/ets
Email helpdesk@wyo.gov
Phone at +1 (307) 777-5000

Public or Private Entities

Wyoming Office of Homeland Security (WOHS)


Federal Bureau of Investigation (FBI)
Internet Crime Complaint Center (IC3)

Enterprise Endpoint Security
(Core Service)

Endpoint security software prevents, detects, and removes malware, including viruses, worms and spyware from user devices.

IT Vulnerability Assessment
(Enhanced Service)

ETS can assist State agencies to identify vulnerabilities that may affect their IT systems. This may involve ETS being the technical team or assisting the agency working with an external 3rd party. 

Secure Socket Layer (SSL/TLS) Certificates (Enhanced Service)

SSL/TLS Certificates establish a secure encrypted connection between a browser (user’s computer) and a server (website).

Enterprise Security 

(Core Service)

Enterprise security consists of policies, network hardware and software provisions monitoring and

preventing unauthorized access, misuse, modification, or denial of a computer network and

network-accessible resources;

Payment Card Industry (PCI) Compliance (Enhanced Service)

PCI Assessment, Customer Compliance Portal, PCI Report on Compliance