Cyber Security

Cyber Security Mission

Cyber related attacks are increasing and becoming more diverse in today's computing environment. Cyber security is an IT service that protects against threats and attacks that can impact systems operational state and comprise data. Our focus is to protect, computers, networks, applications, and data from unauthorized access, change, or destruction.

Our program is built around protecting IT systems thru policies, procedures, and standards that conform to industry best practices and regulatory requirements. Protecting our environment is everyone's responsibility to be aware and vigilant. Everyone has a role in protecting data and access to systems.


Phishing is a type of cyber-attack that is used to exploit your emails. Emails are received from adversaries that are trying to collect emails, download malicious applications on your equipment, or exploit your contact list. These emails are very tricky and can look like they are from a legit sender you conduct business with or from legit companies.

Included are some things to review in your email and if you see these things make sure to report it.

  • Do not open emails that you are not expecting.
  • Email address from the senders that have misspelling or a domain that is not recognized.
  • Vendors and common companies will have recognized branding, however if there are misspellings in the body of the message or poor grammar the email may not be from the company.
  • Before clicking on a link in an email hoover your mouse over the link. The link should start with a known domain and then have further file extensions.
  • If you are prompted for a password reset, ensure the website you are pointed to is a known site. Also, most sites do not have you put in your password, a temporary password or code is given to you in a separate email to change to.

Travel Tips

When you are traveling outside of your normal working environment there are some quick things to be aware of and check to keep IT systems and data safe.

  • Make sure that you lock your screen when you are not using your device.
  • All sensitive data should be stored in a approved application or database.
  • Make sure that you are accountable for your computer and devices that can access the College IT environment. It can be easy to miss place or forget your device when they are portable.
  • Make sure that when you are logging into the computer and applications that you continue to use a protected secure method. The secure method will be the same experience as if you were on campus.
  • If something looks suspicious contact the IT Help Desk and report.

Out of Country Travel Tips

Employees and staff that are traveling outside of United States and still need access, we recommend that two weeks before your trip to submit a request. Ensure that you contact the Help Desk with the Country you are visiting and duration of the trip.