Immediate Concerns for the Campus Community
Immediate Concerns in the Community
Visit Symantec Security Response.
Personally Identifiable Information Protection
The target of almost all hackers is Personally Identifiable Information (PII) data. PII is data that can be used to uniquely identify or locate a single person. Whether you are an institution handling thousands of sensitive records or an individual whose banking information is on an electronic device, you are a potential target.
No longer is your computer the only device at risk. Flash drives, smart phones, tablets and removable drives have increased the risk for data breaches. It is important that you know and exercise the steps that will keep your data safe. Paramount in these warnings is appropriate use of passwords and encryption technology. But the best advice is to avoid transferring or storing confidential data on removable storage devices. And always encrypt.
- Public Wireless Networks
- Home Wireless Networks
- Laptop Security
- iPad Security
- Flash Drive Security
- Smart Phone Security
The term phishing describes a situation where a malicious party solicits personal and financial information through the use of lures. These lures come in the form of emails or pop-up messages. The following link gives important steps you can take to avoid getting hooked by a phishing scheme.
Spyware refers to software that performs tasks on your computer, usually without your consent. Examples are programs that bombard you with advertising or collect your personal information. Learn about the preventative and reactionary measures you can take.
Identity theft occurs when someone uses your personal information without your consent to commit fraud. Unfortunately, you can't entirely control whether you become a victim or not. But you can take steps to minimize the risk.
A computer virus is a self-replicating computer program that affects the way a computer operates. A virus often replaces existing executable files with a virus-infected copy. Some viruses can be intentionally destructive, destroying data, while some viruses are merely annoying.
If you suspect your computer has a virus, please contact the TMCC help desk.
Peer-to-Peer File Sharing
Peer-to-Peer (P2P) file sharing technology allows people to share files online through an informal network. While convenient and conducive to an open workplace, P2P can also expose you to viruses, malware and illegal materials. Learn how to minimize the risks when partaking in P2P.
Spam and SPIM
Spam, the electronic version of junk mail, is a nuisance at best, a danger at worst. SPIM, a version of spam sent over instant messaging software, poses the same risks. Both are an easy way for viruses to spread from computer to computer. Spam clutters your inbox and wastes time and resources. Spam and SPIM often phish for confidential information like credit card numbers, bank information or social security numbers. Never respond to spam emails. Never click on links within a suspicious email or instant message. Your common sense and judgment are your best tools against spam and SPIM.
- Barracuda SPAM Firewall — How to Log in to Manage
- Common Fraud Scams
- Jury Duty Scam
- Top 10 Internet Hoaxes
- Visa & MasterCard Telephone Credit Card Scam
- IRS Scam
- Symantec on Spam
Risks for Home Users
Because the home user is out of the net of protection offered by TMCC's ITO department and our carefully managed network, the home user faces more risk. Following are some links to help you effectively minimize those risks.
Computing Safety Presentations
The information technology office (ITO) has created a presentation that covers some of the more important points of computing safety.
Run Time: 25:19 min
An associated PowerPoint file-counterpart is attached in each of the PDF presentation files above. To access this file, open the PDF file and click on the 'lower, left-hand' corner tab labeled: "Attachments", or designated with a "Staple" graphic.
Seminar: Keeping You and the Campus Safe
Emails sent through the College's network are not private as noted on the login page of every computer.
"Unauthorized user or access is prohibited. By continuing to use this computer system, you accept the rights and responsibilities in the TMCC Telecommunications User Policy ( effective March 2005). Your privacy is carefully guarded but cannot by guaranteed. Examination of information stored or accessed on the system may occur if authorized by the appropriate authorities."
Upon employment and entrance orientation, each TMCC employee signed the Telecommunications Use Policy.