Information Technology Security
STCC is a proud champion of the National Cyber Security Awareness initiative. October is National Cyber Security Awareness Month. This year, the theme is ... Our Shared Responsibility. It is Our Shared Responsibility to ensure that we stay safe online, both in our home environment, and in our work/ school environment.
For more information related to Cyber Security Awareness Month, visit
Tip of the Month: Broaden your vocabulary! For a glossary of cyber security related terms, click on NCASM Cyber Security Glossary, below.
Responsible Computing for Faculty and Staff, Students
Click on the following links for more information on data security and Red Flags Rules, and other cyber security related topics.
STCC policy on the use of IT resourcesThe College has a policy on the Use of Information Technology Resources, which covers many all users of STCC's information technology resources are expected to follow. To review the College policy, visit http://www.stcc.edu/handbook/ITPolicy.asp
The safest course of action is to never open a suspicious email. Check this link for more information
Do you want to know if that weird email message you received is a scam or spam? Visit
to check if what you have received is similar to other suspicious or fraudulent emails, phishing scams, or schemes to commit identity theft that are currently circulating on the Internet.Remember, if you receive an email with text similar to these messages, DO NOT respond; delete it immediately! Do not click any links in the email, and do not unsubscribe or acknowledge the email in any way. If you receive an email that appears phishy and are unsure if it's legitimate, and it is not listed, please report it to the IT Help Desk (at firstname.lastname@example.org ).
Protecting your computer
The best defense for your computer against spyware and other malicious software is your own vigilance. For information related to protecting your computer, check out the document below;
Protecting your networkOrganizations can employ a number of techniques to reduce the IT costs, abuse of system resources and productivity loss associated with malicious and commercial spyware. For more information on this topic, visit
Internet Safety and Security for College Students
As a college student, your computers and mobile devices are primary tools for your educational and social life. Many students use the internet for homework, research, online purchases, social networking, and more. As amazing a tool as it is, the internet must be used safely and securely. The first step: Stop. Think. Connect. For more information,
Red Flags Rule, and Highlights
STCC developed the Identity Theft Prevention Program, pursuant to the
Federal Trade Commission Red Flags Rule, which implements Section 114
of the Fair and Accurate Credit Transactions Act of 2003. This
program was developed with oversight and approval of the Committee on
Internal-External Relations of the STCC Board of Trustees. This
program was approved on March 23, 2009. For details on the program,
Red Flags Rule (.pdf)
In order to follow rules related to sharing of personally identifiable information (PII), emails containing such information should be encrypted utilizing a method that meets government standards for protecting PII. Once a document is encrypted, it cannot be opened without a password. For more information on encryption, visit