Cyber Security

Cyber ​​security mission

Cyberattacks are increasing and becoming more diverse in today's computing environment. Cybersecurity is an IT service that protects against threats and attacks that can affect the operational health of systems and compromise data. Our focus is on protecting computers, networks, applications and data from unauthorized access, modification or destruction.

Our program is based on protecting IT systems through policies, procedures and standards that comply with industry best practices and legal requirements. Protecting our environment is everyone's responsibility to be aware and vigilant. Everyone has a job to protect data and access to systems.

Phishing

Phishing is a type of cyber-attack that is used to exploit your emails. Emails are received from adversaries that are trying to collect emails, download malicious applications on your equipment, or exploit your contact list. These emails are very tricky and can look like they are from a legit sender you conduct business with or from legit companies.

Included are some things to review in your email and if you see these things make sure to report it.

  • Do not open emails that you are not expecting.
  • Email address from the senders that have misspelling or a domain that is not recognized.
  • Vendors and common companies will have recognized branding, however if there are misspellings in the body of the message or poor grammar the email may not be from the company.
  • Before clicking on a link in an email hoover your mouse over the link. The link should start with a known domain and then have further file extensions.
  • If you are prompted for a password reset, ensure the website you are pointed to is a known site. Also, most sites do not have you put in your password, a temporary password or code is given to you in a separate email to change to.

Travel Tips

When you are traveling outside of your normal working environment there are some quick things to be aware of and check to keep IT systems and data safe.

  • Make sure that you lock your screen when you are not using your device.
  • All sensitive data should be stored in a approved application or database.
  • Make sure that you are accountable for your computer and devices that can access the College IT environment. It can be easy to miss place or forget your device when they are portable.
  • Make sure that when you are logging into the computer and applications that you continue to use a protected secure method. The secure method will be the same experience as if you were on campus.
  • If something looks suspicious contact the IT Help Desk and report.

Out of Country Travel Tips

Employees and staff that are traveling outside of United States and still need access, we recommend that two weeks before your trip to submit a request. Ensure that you contact the Help Desk with the Country you are visiting and duration of the trip.


Enhance Your Cybersecurity Know-How!

In today's digital landscape, staying secure is a shared responsibility. Cyber threats are evolving, making ongoing training crucial to safeguarding our digital world.

Ready to level up your cybersecurity knowledge? We've partnered with KnowBe4, a leading cybersecurity training platform to provide employees with additional training resources. Click the button below to access specialized modules covering various topics—from basics to advanced defense strategies.

Cybersecurity Training