Information Security Resources

Employees | Home

For Employees

It can sometimes be difficult to understand your role in protecting college data and information resources. This page serves as a reminder of those responsibilities and provides assistance to protect college resources.

All users of information resources:

  • Must not abuse their privileges. The Acceptable Use of Information Resources policy defines the expectations and the activities that are prohibited.
  • Protect the data in their possession according to the classification category that is assigned and follow the procedures set by the data owners.

Employee Resource Links:


For Home

Protect yourself and your family

Train yourself and your family:

Awareness is the first and most important step. You need to be aware of the threats and be ready to defend yourself or your children.

Add defenses against malware:

Malware protection is not a silver bullet. It is an additional layer of protection that is there in case you are tricked into downloading malware to your device.

Keep your software trusted and up-to-date:

Trusted software is from reputable companies, including the vendor that made your operating system. Also, make sure that you are downloading it from a trusted source (like the website of the vendor). If not, you are running the risk of downloading a trojan horse. The next step is to keep your software up-to-date. Leverage automatic updating features as much as possible.

If you are a victim of cyber crime

File a report with your local police department and also submit a report to the Internet Crime Complaint Center (IC3).

back to top