Skip to main content
Common Threat Types
- : Communications (most commonly e-mails) for the purpose of obtaining personal information (such as passwords or credit card numbers) or manipulating others to perform unauthorized actions (such as bank transfers or purchases).
- Malware: malicious software such as computer viruses, worms, Trojan horses, ransomware, key loggers and spyware.
- Social Engineering: the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. This would include scareware.
Be Prepared
- Education and Training (knowing is half the battle, see below)
- Use Password managers (programs to aid you in keeping track of passwords):
- Use (MFA adds security to your logins) where possible:
- ÃÈ·µ¼º½ offers this for employee e-mail and other systems (send a request via the Help Desk, helpdesk@ccsf.edu)
- Google offers it with their accounts. They call it 2 step. ()
- Use malware protection software (to add security to our computing devices):
- Use a Virtual Private Network (VPN adds security to your internet browsing) when possible:
- Follow Safe Computing Practices
Education/Training
- Online Training classes:
-
- ~24 videos (about an hour, 1-4 minutes per module)
- Self-paced
- Certificate awarded upon completion
- ÃÈ·µ¼º½ employees can access via
-
- 3 short videos (~3.5 minutes each)
- Cybersecurity 101
- Hacking and Privacy
- Cyber Codes
- Interactive Game
-
- ~15 courses on various Cyber Security topics
- We recommend starting with Cyberessentials
- Self-paced
- Certificate awarded upon completion
-
- ÃÈ·µ¼º½ is in the process of adopting this standard