Cyber security

Common Threat Types

  • : Communications (most commonly e-mails) for the purpose of obtaining personal information (such as passwords or credit card numbers) or manipulating others to perform unauthorized actions (such as bank transfers or purchases).
  • Malware: malicious software such as computer viruses, worms, Trojan horses, ransomware, key loggers and spyware.
  • Social Engineering: the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. This would include scareware.

Be Prepared

  • Education and Training (knowing is half the battle, see below)
  • Use Password managers (programs to aid you in keeping track of passwords):
  • Use  (MFA adds security to your logins) where possible:
    • ÃÈ·­µ¼º½ offers this for employee e-mail and other systems (send a request via the Help Desk, helpdesk@ccsf.edu)
    • Google offers it with their accounts. They call it 2 step. ()
  • Use malware protection software (to add security to our computing devices):
  • Use a Virtual Private Network (VPN adds security to your internet browsing) when possible:
  • Follow Safe Computing Practices

Education/Training

  • Online Training classes:
      • ~24 videos (about an hour, 1-4 minutes per module)
      • Self-paced
      • Certificate awarded upon completion
      • ÃÈ·­µ¼º½ employees can access via
      • 3 short videos (~3.5 minutes each)
        • Cybersecurity 101
        • Hacking and Privacy
        • Cyber Codes
      • Interactive Game
      • ~15 courses on various Cyber Security topics
        • We recommend starting with Cyberessentials
      • Self-paced
      • Certificate awarded upon completion
    • ÃÈ·­µ¼º½ is in the process of adopting this standard