Malware - “Cryptolocker Ransomware”
Prevention: Do not open email attachments from senders you do not know or attachment you do not understand as to why they were sent to you. If you own personal devices make sure the anti-virus software is up to date.
A particularly nasty phishing scheme is making it way around the US and the world and hooking unsuspecting users and downloading and executing malware on your computer that restricts access to your computer files and gives you 72 hours (typically) to pay a ransom to get access back to your computer files, etc.
The IT dept. is doing everything it can to keep it from getting to your inbox and your computer, but you are the last line of defense. Remember security is everyone’s business.
IF You Are Infected: If you get the following screen on your computer, shut it down and disconnect it from the network immediately and call the IT Helpdesk (ext. 4357).
Online Security Management Training
The online security training video will emphasize the importance of protecting sensitive data in your daily work routine and is also a review of the proper use of the College computing infrastructure. The training will take approximately 20 minutes.
- Training Video - After you have finished viewing the video, be sure to complete the "COD Security Management Training Acknowledgement" form to record your participation.
- Contact the Employee Development Center (EDC) (EDC@cod.edu or ext. 3805) or the IT Helpdesk (firstname.lastname@example.org or ext. 4357) with any questions.
“Phishing” Scam - Like fishing, these increasingly sophisticated scams try to “hook” you so that the scammers can “reel-in” your personal/private information. Read more about "Phishing".
A guide for users of the College Electronic Communications Infrastructure
A summary of the guide for users of the College Electronic Communications Infrastructure
Standards for Safeguarding Customer Information (The Gramm-Leach-Bliley Act) - A guide for College Employees
The Higher Education Opportunity Act (HEOA) was signed into law on Aug. 14, 2008. Final regulations were issued on Oct. 29, 2009. Enforcement of the HEOA provisions began July 1, 2010, and all colleges and universities are required to make a good-faith effort at compliance.
College-Wide Sensitive Data Incident Response Plan
The purpose of the College-Wide Sensitive Data Incident Response Plan (“The Plan”) is to provide a well-defined, organized approach for handling any potential unauthorized access/breach of sensitive data here at College of DuPage (COD). The Plan identifies and describes the roles and responsibilities of the Incident Response Team. The Plan also contains instruction on how the team is to prepare and how The Plan is to be maintained. Also included in The Plan is the contact information for every team member and other important personnel here at the college. The College-Wide Sensitive Data Incident Response Team, under the coordination of the Chief Security Officer, IT, is responsible for putting the plan into action. Copies of the College-Wide Sensitive Data Incident Response Plan are CONFIDENTIAL. Copies can be obtained by college staff, with the need to know, by contacting Keith Conlee, email@example.com, x3055.
An MS Outlook email ID is assigned to a default set of email distribution groups when it is created. After creation your email ID may be assigned to other existing email distribution groups depending on your job category and/or job function. If needed, a new email distribution group may be requested. The email distribution group assignment procedure documents how the college assigns email IDs to existing email distribution groups, and how to request the creation or deletion of an email distribution group.
- Setup SPAM Protection in Exchange
For more information about College Guidelines, Federal Regulations, and Industry Standards that the college and college staff must conform to, refer to the following references. The college must comply with these guidelines, regulations, and standards, or face liabilities including but not limited to fines, and lost service capability. The IT Security Management function is responsible for making sure compliance is met which includes technical compliance, and staff training, awareness, and compliance demonstration.
FERPA (Family Educational Rights and Protection Act)
Requires protection of education records. Learn More
PCI DSS (Payment Card Industry Data Security Standard)
Requires the protection for all credit card information and transactions. Learn More
GLBA (Gramm-Leach-Bliley Act)
Requires protection of financial information
FTC - Summary and Act
HIPAA (Health Insurance Portability and Accountability Act)
Requires the protection of individually identifiable health information. Learn More
CALEA (Communications Assistance for Law Enforcement Act)
Requires electronic communication providers to provide easy access for law enforcement agencies to electronic communications for the purpose of electronic surveillance. Learn More
HEOA (Higher Education Opportunity Act)
Among other things outside IT requires the monitoring and stopping of illegal P2P file sharing. Learn More