Thursday, April 28, 2016

Shred Event TODAY!

Did you know...
There's a 1-in-33 chance you'll have your identity stolen in the next year.

















Shred Event
Thursday April 28 - TODAY!
1:00pm - 3:00pm
Main Circle Drive by the Launer breezeway

Tuesday, April 26, 2016


This week for our Tech Tip Tuesday, we're focusing on making sure you're secure!

Check it out here.

Thursday, April 21, 2016

Tech Trivia Thursday







#TechTriviaThursday is in honor of our shred event again, coming up on the 28th NEXT WEEK!

Did you know...
It only takes one or two pieces of personal information from your trash for a thief to steal your identity.





















Make sure and get our shred event on your calendar!
Shred Event
Thursday April 28
1:00-3:00pm
Main Circle Drive

Wednesday, April 20, 2016

What to shred?

Last week we gave you reasons why you should shred, now here's a list of what you should shred. And don't forget to get the shred event on your calendar, it's next week! 




What to shred?
  • Anything that has a signature, account number, social security number, or medical or legal information.
  • Address labels from junk mail and magazines
  • ATM receipts, Bank statements
  • Birth certificate copies
  • Canceled and voided checks
  • Credit and charge card bills, carbon copies, summaries and receipts
  • Credit reports and histories
  • Documents containing maiden name
  • (used by credit card companies for security reasons)
  • Documents containing name, address, phone or e-mail address
  • Documents relating to investments
  • Documents containing passwords or PIN numbers
  • Driver's licenses or items with a driver's license number
  • Employment records
  • Employee pay stubs
  • Expired passports and visas
  • Unlaminated identification cards
  • (college IDs, state IDs, employee ID badges, military IDs)
  • Legal documents
  • Investment, stock and property transactions
  • Items with a signature
  • (leases, contracts, letters)
  • Luggage tags
  • Medical and dental records
  • Papers with a Social Security number
  • Pre-approved credit card applications
  • Receipts with checking account numbers
  • Report cards
  • Resumés or curriculum vitae
  • Tax forms
  • Transcripts
  • Travel itineraries
  • Used airline tickets
  • Utility bills (telephone, gas, electric, water, cable TV, Internet)


Friday, April 15, 2016

Did you miss our Cloud Security Training this past week?

You can find the slides on the Documentation Page of our Tech Training site under Security Awareness > Cloud Security Training.

https://docs.google.com/a/cougars.ccis.edu/viewer?a=v&pid=sites&srcid=Y291Z2Fycy5jY2lzLmVkdXxjYy10ZWNobm9sb2d5LXNvbHV0aW9ucy10cmFpbmluZ3xneDozOGZkYzUyYjg4NjE1YWM4

 Or click here to view the PDF directly.

Thursday, April 14, 2016

Email scam alert



If you receive this email, it is a scam! 




Here are some tips to remember when looking through your emails:
  1. From line should be coming from Tech Services
  2. The end of the email should be @ccis.edu
  3. Signature line should say Technology Services or Solutions Center
  4. Hover over the link the email wants you to follow and see what the link actually leads to
If you aren't sure if an email is a scam or not, you can always contact the Solutions Center

Tech Trivia Thursday






#TechTriviaThursday is in honor of our shred event coming up on the 28th!

Did you know...
Document shredding is the only legally recognized form of document destruction.


















Make sure and get our shred event on your calendar!

Shred Event
Thursday April 28
1:00-3:00pm
Main Circle Drive

Wednesday, April 13, 2016

Why shred documents?






Did you know we will be holding a Shred Event coming up this month at the home campus? We're bringing in the big shred truck! Make sure to bring us your documents Thursday April 28, between 1-3pm in the main circle drive! Wondering why you should shred your documents? Keep reading!



Why shred documents?

  1. Security reasons. Every business and household has confidential information they don't want shared. This information can be fished out of the trash and used against you. This is an easy-to-implement security plan to ensure there are no mistakes made. Keep a bin in your office at work and home to easily solve the issue.
  2. It's the law. The government is involved with information misuse and protecting individuals from any misuse. This puts the responsibility in the hands of the individual or business to protect the documents they are charged with. Businesses are also responsible for keeping client confidentiality kept protected, under laws such as HIPAA for medical records. 
  3. Prevent identity theft. Identity theft is a fast growing crime in the United States. All it takes is one or two pieces of personal information from your trash for a thief to steal your identity.
  4. Save the Earth. Shredding companies will recycle the shredded papers. Recycling itself is not a safe practice for confidential documents, however the shredded document can be recycled. 
  5. On top of these reasons listed, keep in mind: paper shredding is the only legally recognized form of document destruction. 

Start getting your documents together and check back next Wednesday for a full list of what to shred!

Monday, April 11, 2016

Cloud Security Training


How much do you know about security within “the cloud”?

Come to our cloud security training this Wednesday to become familiar with the cloud and the security precautions to take when storing data.

Wednesday April 13
10:00a – 11:00a  BUH 104
2:00p – 3:00p  Online


Thursday, March 31, 2016

World Backup Day: March 31st

Happy World Backup Day!

Protect yourself against data loss by making electronic copies of important files, commonly referred to as a backup.

Our computers contain vast amounts of data, from family photos and music collections to financial records and personal contacts. In fact, a recent National Cyber Security Alliance/Symantec study found that more than 68% of Americans store 25% or more of their photos digitally. For most people, the loss of that information could be devastating.

Data can be lost in several ways: computer malfunctions, theft, viruses, spyware, accidental deletion, and natural disasters.

Data backup is a simple, three step process:

  • Make copies of your data
  • Select the hardware or method to store your data
  • Safely store the backup device that holds your copied files
Make Copies of Your Data
Many computers come with a backup software program installed, so check to see if you have one. Most backup software programs will allow you to make copies of every file and program on your computer, or just the files you’ve changed since your last backup.

Select Hardware to Store Your Data
When you conduct a backup, the files will have to be stored on a physical device - such as CDs, DVDs, or USB flash drives, an external hard drive, or on the web using cloud-based online storage.

  • CDs, DVDs and flash drives: These are best for storing a small amount of pictures, music, and videos.
  • External hard drive: If your computer serves as the family photo album and music library, it’s best to get an external hard drive that plugs into your computer (preferably via a USB port).  This way, you can assure more adequate storage space for all your files. Copying information will also be faster with these devices.
  • Online backup services: If you don’t want to hassle with new hardware, there are many online backup services available, usually for a monthly fee. Some security software includes this service with your subscription, so be sure to check that you don’t already have this service available. You simply backup your files to a secure server over the Internet. These services have the added advantage of safely storing your files in a remote location and the files can be accessed anywhere you have a connection to the Internet. This can be valuable for people who travel a lot and may need to recover files or if you live in area prone to natural disasters that might require an evacuation.
Safely Store the Backup Device that Holds Your Data

After setting up the software and copying your files on a regular basis, make sure you keep your backup device somewhere safe.  Some ideas include a trusted neighbor’s house, your workplace, a safe, or a secure place at home that would likely survive a natural disaster. Keep your backup device close enough so that you can retrieve it easily when you do your regular backup.

Other software programs are available for purchase if your system does not have a backup program or if you’re seeking other features. Ideally, you should backup your files at least once a week.

For more information on how to back up your data, check out the official World Backup Day site here.



Source STOP. THINK. CONNECT.

Tuesday, March 29, 2016

Malicious email - please delete!

You may have recently received an email from a CCIS staff member with a subject URGENT.  This email is spam and should be DELETED immediately.  

If you clicked on the link and/or provided any personal information through this email or website (upon clicking the link), please let us know immediately. Many malicious emails are sent daily. Below are some best practices to avoid falling prey to malicious attacks:

If you didn't expect a message, link, or attachment from someone, ask yourself why you should trust that it really came from the apparent sender, and that it's safe. When in doubt, it's a good idea to call and verify that they sent you the message.

If you question the authenticity of a hyperlink, hover over it and see if the hyperlink matches the URL displayed or the sender.

Technology Services will never ask you for your password in an email or during a phone call. You should never share your password with anyone including a Technology Services representative.

Never respond to an email asking for account information, credit card numbers, PINs, or other personally identifying information. 

Immediately report any suspicious email to the Technology Solutions Center at help.ccis.edu or at 573-875-HELP (4357) or 800-231-2391 ext 4357.

Our goal is to protect users from unsolicited messages and social engineering attempts to gain sensitive information like user names or passwords. Occasionally, despite all precautions, unsolicited email can make it through the best security systems. Please keep in mind the above guidelines when viewing email to help keep our information systems secure.