Idaho Official Government Website
|
|

Cybersecurity Focus of the Month: MFA

Cybersecurity Focus of the Month: MFA

Multifactor Authentication (MFA) has been found to stop 99% of all cyber attacks related to credential-based attacks where credentials were captured, purchased, or stolen. Properly implemented, this makes it less likely for a bad actor to use a person’s identity to carry out a cyber attack. Read more...
Cybersecurity Statistic of the Month: Password Complexity and MFA

Cybersecurity Statistic of the Month: Password Complexity and MFA

Part of password complexity includes lock out triggers and lock out times. It is unlikely a user will type a password incorrectly five times and even less likely to do so in one second. Requiring a 15 minute time out after five consecutive incorrect password attempts increases the amount of time required to crack a password. According to a Forbes study, 35% of people with stolen passwords say that a simple password was the cause of their problems. Read more...
ESRI Student Competition

ESRI Student Competition

Every year ESRI hosts a national Student Mapping Competition utilizing Geographic Information System (GIS) technology for students in grades 4-12 to tell a story about their state. This competition empowers students to think spatially, problem solve, critically think and be creative within the classroom setting. Read more...
Cyber Discovery 2024

Cyber Discovery 2024

The Idaho National Guard (IDNG) and ITS recently hosted Cyber Discovery 2024. Cyber Discovery is a regional cyber exercise built upon a five-year partnership focused on consultation, training, and assistance in support of security operations, incident tracking, and response. Read more...
Cybersecurity Focus of the Month: Oversharing

Cybersecurity Focus of the Month: Oversharing

Odds are that you have recently seen something posted to social media and commented in surprise “I can’t believe someone posted this online!” This all-too-common occurrence happens to everybody who uses social media. Unfortunately, this includes cyber criminals that troll social media sources looking for this information to use for their own devious purposes. Read more...

Feedback