Proactive prevention of cybersecurity threats and response to potential incidents.
Service Includes
- Monitor threat alerts from internal and external sources
- Email phishing and malicious attachment inspection
- Cyber incident response
- Log inspection for anomalies
Prerequisites
- ITS antivirus detection software
- State owned hardware and software
What Is Excluded
• Personally-owned hardware and software
Customer Responsibility
- Timely notification of potential cybersecurity issues
- Follow ITA acceptable use policies for hardware and software
- Agency cooperation with investigative process