Information Technology Security

 


STCC is a proud champion of the National Cyber Security Awareness initiative.  October is National Cyber Security Awareness Month.  This year, the theme is ... Our Shared Responsibility.

It is Our Shared Responsibility to ensure that we stay safe online, both in our home environment, and in our work/ school environment.  For more information related to Cyber Security Awareness Month, visit

http://staysafeonline.org/

Tip of the Month: Broaden your vocabulary!  For a glossary of cyber security related terms, click on NCASM Cyber Security Glossary, below.

http://www.staysafeonline.org/ncsam/glossary/

Responsible Computing for Faculty and Staff, Students

Click on the following links for more information on data security and Red Flags Rules, and other cyber security related topics.

STCC policy on the use of IT resources

The College has a policy on the Use of Information Technology Resources, which covers many all users of STCC’s information technology resources are expected to follow.  To review the College policy, visit http://www.stcc.edu/handbook/ITPolicy.asp

STCC Security Awareness Training

To review the College security awareness training, click on STCC Security Awareness Training .

and select STCC Security Awareness Training.  This is a Microsoft Powerpoint presentation, detailing issues related to security, especially pertaining to a college environment.

Email Security

The safest course of action is to never open a suspicious email.  Check this link for more information…

http://www.stcc.edu/it/it_email_secuity.asp

Do you want to know if that weird email message you received is a scam or spam? Visit

http://www.symantec.com/security_response/landing/risks/hoaxes.jsp

to check if what you have received is similar to other suspicious or fraudulent emails, phishing scams, or schemes to commit identity theft that are currently circulating on the Internet.

Remember, if you receive an email with text similar to these messages, DO NOT respond—delete it immediately! Do not click any links in the email, and do not “unsubscribe” or acknowledge the email in any way. If you receive an email that appears “phishy” and are unsure if it's legitimate, and it is not listed, please report it to the IT Help Desk (at helpdesk@stcc.edu ).

Protecting your computer

The best defense for your computer against spyware and other malicious software is your own vigilance.  For information related to protecting your computer, check out the document below;

http://www.stcc.edu/it/docs/ProtectingYourComputer.pdf

(made available on STCC website with permission of Anti-Spyware Coalition,

http://www.cdt.org/about/copyright.php )

Protecting your network

Organizations can employ a number of techniques to reduce the IT costs, abuse of system resources and productivity loss associated with malicious and commercial spyware.  For more information on this topic, visit 

http://www.stcc.edu/it/docs/ProtectingYourNetwork.pdf

(made available on STCC website with permission of Anti-Spyware Coalition,

http://www.cdt.org/about/copyright.php )

Internet Safety and Security for College Students

As a college student, your computers and mobile devices are primary tools for your educational and social life.  Many students use the internet for homework, research, online purchases, social networking, and more.  As amazing a tool as it is, the internet must be used safely and securely.  The first step:  Stop.  Think.  Connect.  For more information,

College Students and Internet saftey and security (.pdf)

(made available on STCC website with permission of stopthinkconnect.org, http://stopthinkconnect.org/ )

 Red Flags Rule, and Highlights

STCC developed the Identity Theft Prevention Program, pursuant to the Federal Trade Commission Red Flags Rule, which implements Section 114 of the Fair and Accurate Credit Transactions Act of 2003.  This program was developed with oversight and approval of the Committee on Internal-External Relations of the STCC Board of Trustees.  This program was approved on March 23, 2009.  For details on the program, visit 

Red Flags Rule (.pdf)

Document Encryption

In order to follow rules related to sharing of personally identifiable information (PII), emails containing such information should be encrypted utilizing a method that meets government standards for protecting PII.  Once a document is encrypted, it cannot be opened without a password.  For more information on encryption, visit

Document Encryption (.pdf)

Personally Identifiable Information (PII)

For more information on PII, read more at STCC Security Awareness Training, above.