Information Technology

Agency Focus
Analyze, coordinate, and implement information technology for Washington County

Program
The Information Technology Department provides the technology leadership, system implementation, and ongoing support for a broad range of technologies used by county departments to provide quality services to our citizens, visitors, and businesses. We provide to other Washington County departments services for analyzing, planning, coordinating, developing, and implementing computer software and hardware, as well as, providing continued training and technical assistance.

Types of Support Provided
  • Application Development, Implementation, Training, and Support Services
  • Infrastructure Development and Support Services
  • Enterprise Services
  • Administration and Security
  • Hardware Procurement, Implementation, and Support Services
  • User Community Help Desk
Stop. Think. Connect.
Stop. Think. Connect.™ is the global cyber-security awareness campaign to help all digital citizens stay safer and more secure online. The message was created by an unprecedented coalition of private companies, non-profits, and government organizations with leadership provided by the National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG). NCSA, in partnership with the APWG, continue to lead the campaign. The Department of Homeland Security leads the federal engagement in the campaign.

Cyber Security News

  1. Apple Rushes Fix for Latest ‘Text Bomb’ Bug As Abuse Spreads

    Apple said it is working on a fix for the latest text bomb bug that crashes a number of iOS and Mac apps that display specific Telugu language characters.

    ThreatPost Cyber Seurity Information
  2. Paper Documents Also Have to Be Protected

    Keep in mind that digital data is not the only thing that needs to be protected. Paper documents also need to be protected. When disposing of any confidential documents, make sure they are shredded first or disposed of in bins for shredding. Also,...

  3. Intel Expands Bug Bounty Program Post-Spectre and Meltdown

    Intel will pay up to $250,000 to researchers who identify bugs more severe than 9.0 on the CVSS scale.

    ThreatPost Cyber Seurity Information
  4. Reported Critical Vulnerabilities In Microsoft Software On the Rise

    Avecto researchers say removing admin rights from users would mitigate many of the threats.

    ThreatPost Cyber Seurity Information
  5. Word-based Malware Attack Doesn’t Use Macros

    Malicious e-mail attachments used in this campaign don’t display any warnings when opened and silently install malware.

    ThreatPost Cyber Seurity Information
  6. Two Home Computers

    If possible, have two computers at home -- one for parents and one for kids. If you are sharing a computer, make sure you have separate accounts for everyone and that kids do not have privileged access.

View All

Did You Know?

What happens on the internet in one minute
Broadband Speed Test
You can help improve broadband speed in New York State by taking the broadband speed test.  Learn more about Broadband programs in New York State as well as the new Broadband For All Program.