Information Security Resources
For Employees
It can sometimes be difficult to understand your role in protecting college data and information resources. This page serves as a reminder of those responsibilities and provides assistance to protect college resources.
All users of information resources:
- Must not abuse their privileges. The Acceptable Use of Information Resources policy defines the expectations and the activities that are prohibited.
- Protect the data in their possession according to the classification category that is assigned and follow the procedures set by the data owners.
Employee Resource Links:
- CIS Benchmarks
(Licensed for all STC employees and students) - Duo Security Device Management Portal
(STC Network Only) - National Initiative for Cybersecurity Careers and Studies
(Training available for all STC employees) - STC Email Quarantine
- Secure Share Service
- Secure VPN Service
For Home
Protect yourself and your family
Train yourself and your family:
Awareness is the first and most important step. You need to be aware of the threats and be ready to defend yourself or your children.
- Stay Safe Online Studies
- Federal Trade Commission Consumer Information - Privacy, Identity & Online Security
Add defenses against malware:
Malware protection is not a silver bullet. It is an additional layer of protection that is there in case you are tricked into downloading malware to your device.
- Malware Protection: Microsoft Security Essentials (free) and Bitdefender (free and paid).
- Content Filtering (including malware): Home Internet Security from OpenDNS.
- Online file/website analyzer: Leverage VirusTotal to analyze suspicious files or URLs.
Keep your software trusted and up-to-date:
Trusted software is from reputable companies, including the vendor that made your operating system. Also, make sure that you are downloading it from a trusted source (like the website of the vendor). If not, you are running the risk of downloading a trojan horse. The next step is to keep your software up-to-date. Leverage automatic updating features as much as possible.
- Configure your computer for automatic updates (Windows, Mac)
- Personal Software Inspector (free)
If you are a victim of cyber crime
File a report with your local police department and also submit a report to the Internet Crime Complaint Center (IC3).