Information Technology

Agency Focus
Analyze, coordinate, and implement information technology for Washington County

Program
The Information Technology Department provides the technology leadership, system implementation, and ongoing support for a broad range of technologies used by county departments to provide quality services to our citizens, visitors, and businesses. We provide to other Washington County departments services for analyzing, planning, coordinating, developing, and implementing computer software and hardware, as well as, providing continued training and technical assistance.

Types of Support Provided
  • Application Development, Implementation, Training, and Support Services
  • Infrastructure Development and Support Services
  • Enterprise Services
  • Administration and Security
  • Hardware Procurement, Implementation, and Support Services
  • User Community Help Desk
Stop. Think. Connect.
Stop. Think. Connect.™ is the global cyber-security awareness campaign to help all digital citizens stay safer and more secure online. The message was created by an unprecedented coalition of private companies, non-profits, and government organizations with leadership provided by the National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG). NCSA, in partnership with the APWG, continue to lead the campaign. The Department of Homeland Security leads the federal engagement in the campaign.

Cyber Security News

  1. Akamai CSO Talks Cryptominers, IoT and the Reemergence of Old Threats

    Andy Ellis, CSO Akamai, discusses how the company works with others within the cybersecurity landscape to help keep the internet safe.

    ThreatPost Cyber Seurity Information
  2. Podcast: How Millions of Apps Leak Private Data

    Threatpost's Tom Spring talked to Roman Unuchek, senior malware analyst at Kaspersky Lab, about his discoveries this week at the RSA Conference.

    ThreatPost Cyber Seurity Information
  3. HackerOne CEO Talks Bug Bounty Programs at RSA Conference

    Can bug bounty programs be designed to protect consumer privacy and how do programs balance white hat disclosure versus companies sitting on vulnerabilities until they are fixed?

    ThreatPost Cyber Seurity Information
  4. Major News Events

    When a major news event happens, cyber criminals will take advantage of the incident and send phishing emails with a subject line related to the event. These phishing emails often include a link to malicious websites, an infected attachment or are a...

  5. IoT Security Concerns Peaking – With No End In Sight

    Despite numerous talks about IoT vulnerabilities at RSAC this week, a clear resolution on fixes is nowhere in sight.

    ThreatPost Cyber Seurity Information
  6. Cloud Credentials: New Attack Surface for Old Problem

    Researchers show why keeping a handle on user credentials is just as hard in the cloud as it is on local networks.

    ThreatPost Cyber Seurity Information
View All

Did You Know?

What happens on the internet in one minute
Broadband Speed Test
You can help improve broadband speed in New York State by taking the broadband speed test.  Learn more about Broadband programs in New York State as well as the new Broadband For All Program.