The MiCTA RFP Process Guide



MiCTA Process and Procedures on Biteable.

Click here to view our RFP Process guide.

Introducing the MiCTA RFP Process and Procedures for Procurement video! This new video summarizes the MiCTA RFP process in a simple two minute video. This allows anyone to get an idea of what goes into our requests without having to sift through a twelve page document. We've also added the document version for reference if you have any questions. 

2017 MiCTA Annual Meeting and Vendor Conference


MiCTA will hold its 2017 Vendor Meeting on Thursday August 3 and the Membership Annual Meeting on Friday August 4.  Both meetings will take place at The Henry, Autograph Collection, located in Dearborn Michigan.  Members are welcome to attend both meetings.  You must pre-register for each meeting before July 19th.

The Annual meeting will include extensive changes to the MiCTA Bylaws. All MiCTA members in good standing are welcome to attend in person or proxy. Please fill out the RSVP form by July 19th. Additional details and the final agenda will be sent prior to the event.  For more information call Toll Free: 888-964-2227 or Email:

Link to the promo

Information Technology Sector


Strategic Management Associates- MiCTA Approved National Vendor.

WannaCry Decryption Tools for Windows XP, 2003, Vista, 2008 and 7

May 19, 2017:  It has been confirmed by third party specialists, two decryption software tools are effective for “WannaCry”……..WannaKey and WanaKiwi (aka gentilkiwi).Source:

Britain’s Nuclear Submarines Exposed to WannaCry as They’re Still on Windows XP

May 22, 2017: Windows XP wasn’t the biggest victim of the WannaCry ransomware, but the lack of patches is always worrying, especially because there is no guarantee that Microsoft would do the same thing in the future and release an emergency update to block infections. Britain’s nuclear submarines are among those that could be vulnerable to future attacks similar to WannaCry, as they are still on Windows XP, with no plans to upgrade to a newer operating system whatsoever.



Crooks use WannaCrypt hysteria as hook for BT-branded phishing emails

May 19, 2017: Criminals have latched on to the WannaCrypt outbreak as a theme for scam emails. Coincidentally some consumers are receiving seemingly genuine warnings from their ISPs related to suspected infection during last week's worldwide ransomware outbreak. Action Fraud warned about a dodgy email trying to trick BT customers on Thursday. Recipients, who were falsely warned that they would be locked out of their account unless they completed a bogus "security check", commented that the emails were convincing. Source:

Small Cells Big Changes


If your company has an aggressive plan for deploying small cell solutions, you’re not alone. Small cell solutions are rapidly moving beyond just providing coverage within buildings or arenas, to becoming enablers of outdoor network densification. All major communications service providers (CSPs) have announced densification plans, with some already deploying small cells into their networks. Read more Deploying Small Cells, what you need to know!

MiCTA Information Advisory

Security Programs will not be able to keep up with Threats for 2017 Source:

Quick Facts- Survey • 90%+ of IT security professionals said that connected devices will be a major security issue this year • 66% aren’t sure how many devices are in their environment • 84% admitted, “Mirai” malware changed their perception about threats • 65% said they either haven’t or don’t know how to check for “Mirai” malware

Information Technology Sector

February 14, Yahoo is accused of failing to cooperate- largest data breaches in history. 1st announced in 9/2016, the 1st breach occurred in 2013, placed Yahoo at the top of the largest data breaches in history & is expanded to 1 billion accounts as of 12/2016.

February 14, Windows 10 Mobile Security Bug Allows Hackers to Bypass Passcode. Windows 10 Mobile allows anyone to bypass security codes on devices running production or preview builds as part of Windows Insider program, and uses a few simple steps providing access to photos.


February 13, US University’s Malware Attack included Vending Machines.  The unnamed university’s story was published in the 2017 Data Breach Digest, describing the impact as bringing the network

“to a crawl” and found the servers were buckling, finding 5,000+ devices infected with malware. "Short of replacing every soda machine and lamp post, I was at a loss for how to remediate the situation," per the University IT administrator.