State of Wyoming Office of Cybersecurity

State of Wyoming agencies rely heavily on information technology to run their daily operations to deliver services to the citizens of Wyoming. With the increasing dependency on IT, the growing complexity of state government's IT infrastructure, and the constantly changing information security threat and risk environment, information security has become a mission-critical function. This function must be managed and governed to reduce the risks to state government operations and to ensure the State’s ability to do business and serve the public.

From left to right: Drew Dilly, Kayla Woods, Timothy Sheehan, Kirsten Anderson, Governor Mark Gordon, Aaron Roberts, Jason Strohbehn, and Eric Wagner.

October 5 2022 - Governor Gordon Recognizes National Cybersecurity Awareness Month with a proclamation signing at the Wyoming State Capitol Building in Cheyenne.

In a recent Facebook post, Governor Gordon shared "raising awareness of computer security essentials will improve the security of Wyoming's information, infrastructure, and economy. Maintaining cybersecurity is a shared responsibility. With proper precautions, we can all do more to protect ourselves from online dangers".

Cybersecurity may seem like a large and complex subject, but really, it’s all about people—beginning with you. We want to help you make smart decisions on the job, at home, at school, and in the future. To learn how you can increase your online security, check back weekly throughout the month for topics on:

  • Enabling multi-factor authentication (MFA) for all important online activities to provide an additional layer of security.

  • Using a trusted password manager and strong passwords.

  • Recognizing and reporting phishing attacks which can infect your machine with malware.

  • Updating software to ensure the most current protection.

We encourage you to explore our partners websites and participate in their theme days, including Women in Tech, International Day, and for anyone interested in exploring a career in cybersecurity, Career Day.

Don’t delay, update your software today!

When software updates become available, vendors usually put them on their websites for users to download. Install updates as soon as possible to protect yourself against attackers who take advantage of system vulnerabilities. Attackers may target vulnerabilities for months or even years after updates are available.

Some software will automatically check for updates. If automatic updates are available, we recommend you take advantage of them. If you are manually updating software, make sure you are only downloading updates from trusted sources. Do not trust a link in an email. Attackers use email messages to direct users to websites hosting malicious files. You should also be suspicious of email messages claiming to have update files attached —these attachments may contain malware.

Avoid updating software (automatically or manually) while connected to untrusted networks. If updates must be installed over an untrusted network, use a Virtual Private Network connection to a trusted network and apply updates.

For more information please visit

Training for State of Wyoming employees is now available through KnowBe4. An email will be sent on Friday, October 28 or you can log in here and learn about software updates.

Phight the Phish!

If a link looks a little off, think before you click it. That link could be an attempt to get sensitive information or install malware on your machine. Phishing is one of the most common types of malware and people often fall victim to these attacks.

If you are a state employee, you can use the orange hook at the top of your email to report suspicious information. Our team of dedicated cyber-experts can investigate and let you know if it is safe!

It could be a text message or even a phone call. They may pretend to be your email service, your boss, your bank, a friend...The message may claim it needs your information because you’ve been a victim of cybercrime.

And they may try to get you to run malicious software, also known as malware. Sadly, we are more likely to fall for phishing than we think.

If it’s a link you don’t recognize, trust your instincts and think before you click. We all need to Phight the Phish!

To learn more about avoiding phishing and social engineering attempts visit

Training for State of Wyoming employees is now available through KnowBe4. An email will be sent on Friday, October 21 or you can log in here and learn how to recognize and report phishing.

Strong passwords can protect you from digital forms of crime!

No matter the account, all passwords should use the guiding principles of LUC (long, unique, and complex).

  1. Long: Passwords should be at least 14 characters long.

  2. Unique: Don't reuse a password. In the event one account is compromised, your other accounts will be safe. No password should look alike.

  3. Complex: When creating a password, use a combination of uppercase, lowercase, numbers, and characters.

You should also reset your password, minimally every few months. It can take companies up to 6 months to notice a data breach has occurred. Resenting your password regularly helps prevent unauthorized access to confidential accounts.

Finally, use a password manager. A password manager establishes one master password and then generates and retrieves passwords for EVERY account you have! This encrypts and protects your online information, answers to security questions, and more! There are many different free or paid passwords available for personal use. We recommend that you compare the different password managers and find the one that works best for you with these trustworthy guides provided by the National Cybersecurity Alliance:

Visit for more information on choosing and protecting passwords.

Training for State of Wyoming employees is now available through KnowBe4. An email will be sent on Friday, October 14 or you can log in here and learn how to create strong passwords!

Don't let bad cyber actors access your information!

Even if you have a complex password, “hackers” can still use computers and other digital devices to gain unauthorized access to information or damage your computer systems.

Industry is taking a second step towards identifying yourself in your accounts. Multi-Factor Authentication (MFA) is FREE, takes a few minutes to enable, and only seconds to use. MFA uses two steps to authenticate that you are who you say you are.

  • Step One: They’ll ask for something you a PIN number or your sister’s middle name.

  • Step Two: They will ask for someline like an authentication application, confirmation text, or a fingerprint or face ID.

If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.

Training for State of Wyoming employees is now available through KnowBe4. An email will be sent on Friday, October 7 or you can log in here and learn how to not be like Rick!

Watch CISA Director Jen Easterly discuss enabling MFA
and learn how to make yourself, and our nation,
more secure!

Partner Events

Commonly Used Terms:

“Threat Actor” - Covers a variety of cybercriminals—hackers, social engineers, or even shoulder surfers!

“Hackers” - Use computers and other digital devices to gain unauthorized access to information or damage computer systems. Hackers may have impressive computer skills, but expert knowledge of programming is not always necessary for a successful breach. Any attempt by threat actors or hackers to gain unauthorized access to a digital computer system can constitute a cyber attack.

What Is Cybercrime?

Cybercrime is any crime committed electronically, such as theft, fraud and even physical threats and endangerment. It is important to know your cyber basics and know how to take action to protect yourself. Being safe on the computer is similar to being safe in your daily offline routine. You would not leave your car unlocked in the middle of a crowded city, so why not apply those same safety principles to your online life?

What Are Physical Cyber Attacks?

Cyber attacks do not always have to come from the internet, and malware can hide easily on some of the data storage devices we trust and use daily. Physical cyber attacks use hardware, external storage devices or other physical types of attacks to infect, damage or otherwise compromise digital systems. The attack can hitch a ride on USB storage devices or flash drives, CDs, hard copies of video games and Internet of Things (IoT) devices such as smartphones, smart watches and even signal devices such as key fobs.

Don't Hesistate - Reach out!

Security concern or incident to report? We are here to help with network security, vulnerabilities, and threats to Wyoming. Email us at

Home | Privacy Policy | Wyo.Gov

Copyright © 2022 State of Wyoming. All Rights Reserved