Did you know...
There's a 1-in-33 chance you'll have your identity stolen in the next year.
Shred Event
Thursday April 28 - TODAY!
1:00pm - 3:00pm
Main Circle Drive by the Launer breezeway
Thursday, April 28, 2016
Thursday, April 21, 2016
Tech Trivia Thursday

#TechTriviaThursday is in honor of our shred event again, coming up on the 28th NEXT WEEK!
Did you know...
It only takes one or two pieces of personal information from your trash for a thief to steal your identity.
Make sure and get our shred event on your calendar!
Shred Event
Thursday April 28
1:00-3:00pm
Main Circle Drive
Wednesday, April 20, 2016
What to shred?
Last week we gave you reasons why you should shred, now here's a list of what you should shred. And don't forget to get the shred event on your calendar, it's next week!

What to shred?
- Anything that has a signature, account number, social security number, or medical or legal information.
- Address labels from junk mail and magazines
- ATM receipts, Bank statements
- Birth certificate copies
- Canceled and voided checks
- Credit and charge card bills, carbon copies, summaries and receipts
- Credit reports and histories
- Documents containing maiden name
- (used by credit card companies for security reasons)
- Documents containing name, address, phone or e-mail address
- Documents relating to investments
- Documents containing passwords or PIN numbers
- Driver's licenses or items with a driver's license number
- Employment records
- Employee pay stubs
- Expired passports and visas
- Unlaminated identification cards
- (college IDs, state IDs, employee ID badges, military IDs)
- Legal documents
- Investment, stock and property transactions
- Items with a signature
- (leases, contracts, letters)
- Luggage tags
- Medical and dental records
- Papers with a Social Security number
- Pre-approved credit card applications
- Receipts with checking account numbers
- Report cards
- Resumés or curriculum vitae
- Tax forms
- Transcripts
- Travel itineraries
- Used airline tickets
- Utility bills (telephone, gas, electric, water, cable TV, Internet)
Friday, April 15, 2016
Did you miss our Cloud Security Training this past week?
You can find the slides on the Documentation Page of our Tech Training site under Security Awareness > Cloud Security Training.
Or click here to view the PDF directly.
Or click here to view the PDF directly.
Thursday, April 14, 2016
Email scam alert
If you receive this email, it is a scam!
Here are some tips to remember when looking through your emails:
- From line should be coming from Tech Services
- The end of the email should be @ccis.edu
- Signature line should say Technology Services or Solutions Center
- Hover over the link the email wants you to follow and see what the link actually leads to
Tech Trivia Thursday

#TechTriviaThursday is in honor of our shred event coming up on the 28th!
Did you know...
Document shredding is the only legally recognized form of document destruction.
Make sure and get our shred event on your calendar!
Shred Event
Thursday April 28
1:00-3:00pm
Main Circle Drive
Wednesday, April 13, 2016
Why shred documents?

Did you know we will be holding a Shred Event coming up this month at the home campus? We're bringing in the big shred truck! Make sure to bring us your documents Thursday April 28, between 1-3pm in the main circle drive! Wondering why you should shred your documents? Keep reading!
Why shred documents?
- Security reasons. Every business and household has confidential information they don't want shared. This information can be fished out of the trash and used against you. This is an easy-to-implement security plan to ensure there are no mistakes made. Keep a bin in your office at work and home to easily solve the issue.
- It's the law. The government is involved with information misuse and protecting individuals from any misuse. This puts the responsibility in the hands of the individual or business to protect the documents they are charged with. Businesses are also responsible for keeping client confidentiality kept protected, under laws such as HIPAA for medical records.
- Prevent identity theft. Identity theft is a fast growing crime in the United States. All it takes is one or two pieces of personal information from your trash for a thief to steal your identity.
- Save the Earth. Shredding companies will recycle the shredded papers. Recycling itself is not a safe practice for confidential documents, however the shredded document can be recycled.
- On top of these reasons listed, keep in mind: paper shredding is the only legally recognized form of document destruction.
Start getting your documents together and check back next Wednesday for a full list of what to shred!
Monday, April 11, 2016
Cloud Security Training
How much do you know about security within “the cloud”?
Come to our cloud security training this Wednesday to become
familiar with the cloud and the security precautions to take when storing data.
Wednesday April 13
10:00a – 11:00a BUH 104
2:00p – 3:00p Online
Register: training.ccis.edu
Thursday, March 31, 2016
World Backup Day: March 31st
Happy World Backup Day!
Protect yourself against data loss by making electronic copies of important files, commonly referred to as a backup.
Our computers contain vast amounts of data, from family
photos and music collections to financial records and personal contacts. In
fact, a recent National Cyber Security Alliance/Symantec study found that more
than 68% of Americans store 25% or more of their photos digitally. For most
people, the loss of that information could be devastating.
Data can be lost in several ways: computer malfunctions, theft, viruses, spyware, accidental deletion, and natural disasters.
Data backup is a simple, three step process:
- Make copies of your data
- Select the hardware or method to store your data
- Safely store the backup device that holds your copied files
Make Copies of Your Data
Many computers come with a backup software program
installed, so check to see if you have one. Most backup software programs will
allow you to make copies of every file and program on your computer, or just
the files you’ve changed since your last backup.
Select Hardware to Store Your Data
When you conduct a backup, the files will have to be stored on a physical device - such as CDs, DVDs, or USB flash drives, an external hard drive, or on the web using cloud-based online storage.
When you conduct a backup, the files will have to be stored on a physical device - such as CDs, DVDs, or USB flash drives, an external hard drive, or on the web using cloud-based online storage.
- CDs, DVDs and flash drives: These are best for storing a small amount of pictures, music, and videos.
- External hard drive: If your computer serves as the family photo album and music library, it’s best to get an external hard drive that plugs into your computer (preferably via a USB port). This way, you can assure more adequate storage space for all your files. Copying information will also be faster with these devices.
- Online backup services: If you don’t want to hassle with new hardware, there are many online backup services available, usually for a monthly fee. Some security software includes this service with your subscription, so be sure to check that you don’t already have this service available. You simply backup your files to a secure server over the Internet. These services have the added advantage of safely storing your files in a remote location and the files can be accessed anywhere you have a connection to the Internet. This can be valuable for people who travel a lot and may need to recover files or if you live in area prone to natural disasters that might require an evacuation.
Safely Store the Backup Device that Holds Your Data
After setting up the software and copying your files on a
regular basis, make sure you keep your backup device somewhere safe. Some ideas include a trusted neighbor’s
house, your workplace, a safe, or a secure place at home that would likely
survive a natural disaster. Keep your backup device close enough so that you
can retrieve it easily when you do your regular backup.
Other software programs are available for purchase if your
system does not have a backup program or if you’re seeking other features.
Ideally, you should backup your files at least once a week.
Source STOP. THINK. CONNECT.
Tuesday, March 29, 2016
Malicious email - please delete!
You may have recently received an email from a CCIS staff member with a subject URGENT. This email is spam and should be DELETED immediately.
If you clicked on the link and/or provided any personal information through this email or website (upon clicking the link), please let us know immediately. Many malicious emails are sent daily. Below are some best practices to avoid falling prey to malicious attacks:
If you didn't expect a message, link, or attachment from someone, ask yourself why you should trust that it really came from the apparent sender, and that it's safe. When in doubt, it's a good idea to call and verify that they sent you the message.
If you question the authenticity of a hyperlink, hover over it and see if the hyperlink matches the URL displayed or the sender.
Never respond to an email asking for account information, credit card numbers, PINs, or other personally identifying information.
Immediately report any suspicious email to the Technology Solutions Center at help.ccis.edu or at 573-875-HELP (4357) or 800-231-2391 ext 4357.
Our goal is to protect users from unsolicited messages and social engineering attempts to gain sensitive information like user names or passwords. Occasionally, despite all precautions, unsolicited email can make it through the best security systems. Please keep in mind the above guidelines when viewing email to help keep our information systems secure.






