skip to content

Information Technology for Minnesota Government

Feature image for About MN.IT Services

About MN.IT Services

As the State of Minnesota’s central IT organization, MN.IT provides IT programs and services to agencies, boards and councils. Our work stretches across the executive branch of state government – from social services to education, to law enforcement and more. MN.IT Services is at the heart of what makes government work for Minnesota. Learn about MN.IT Services

Feature image for Careers


Join over 2,000 professionals who bring strategic vision to state government as part of Minnesota’s information technology agency. Work for MN.IT Services and be part of a cutting-edge organization that is emerging as a national leader in government IT. Career Opportunities

Feature image for Security Resources

Security Resources

MN.IT Services manages all information technology security practices for the State of Minnesota. We'd like to share some cyber security tips with you for keeping yourself and your devices safe at home and at work.  Security Resources

Agency News

The Internet of Health

With summer in full stride, many of us are working toward a healthier version of ourselves. Whether you are running, climbing or kayaking, wearable technology can make this process a little less painful and a little fun. Learn more about how wearable technology is used.

Concerns with Pokémon Go

If you’ve been on the internet or outside lately, you may have noticed people intensely roaming around with their phones in hand playing the new addicting game called Pokémon Go. While the game is fun many have encountered both virtual and real-life dangers with the app.

4th of July Tech Tips

The 4th of July is filled with family gatherings, barbecues, festivals, parades, and fireworks. Whether you are trying to capture that perfect photo, navigate a state park or just need a break from technology, we’ve compiled a few tech tips for a safe and memorable holiday.

Tips to Avoid Phishing Scams

Phishing has been around for almost as long as the internet and is an unnervingly common way for cyber criminals to obtain sensitive data from private individuals and organizations through email attachments and fake websites. Here are 5 ways you can protect yourself.

back to top