Recent updates
-
Reporting Spam
Updated onArticleTo troubleshoot a problem you are having or to block certain emails, Information Technology Services needs to see the complete message that you received including the header information. We usually prefer this to be sent as an attached item where possible.
Knowledge by Tool Technology and Support Information Security
-
Security Tips
Updated onArticle- Be cognizant of FERPA guidelines
- Do NOT save student data on your home computer
- Keep your home computer updated with antivirus/security software
- Do not click on links or attachments from senders that you do not recognize.
- Do not provide sensitive personal information (like usernames and passwords) over email.
- Watch for email senders that use suspicious or misleading domain names.
- Inspect URLs carefully to make sure they’re legitimate and not imposter sites.
- Do not try to open any shared document that you’re not expecting to receive.
- Be especially cautious when opening attachments or clicking links if you receive an email containing the Alamo Colleges District warning banner indicating that it originated from an external source.
Knowledge by Tool Technology and Support Information Security
-
Ten Cybersecurity Best Practices
Updated onArticleWith many employees working remotely, following these ten best practices will keep our data and ID’s safe.
1. Protect your data
Avoid sharing personal information like your Social Security or credit card number when answering an unsolicited email, phone call, text message or instant message. Cybercriminals can create email addresses and websites that look legitimate. They can fake caller ID information and often use a variety of questions and approaches to obtain information that will help them gain access to a company’s financial accounts and transfer funds to a bank account that they control.
It’s important not to leak data, sensitive information or intellectual property. If you share a picture online that shows a whiteboard or computer screen in the background, you could accidentally reveal proprietary information. Also, respect the intellectual property of other companies. Even if it’s accidental, sharing or using the IP or trade secrets of other companies could get both you and your company into trouble.
2. Avoid pop-ups, unknown emails and links
Beware of phishing. Phishers try to trick you into clicking on a link that may result in a security breach. Be cautious of links and attachments in emails from senders you don’t know. Follow this rule—never enter personal or company information in response to an email, pop-up webpage, or any other communication you didn’t initiate. Phishing can lead to identity theft. It’s also the way most ransomware attacks occur.
3. Use strong password protection and authentication
Strong, complex passwords can help stop cyber thieves from accessing ACD information. If a cybercriminal figures out your password, it could give them access to the ACD’s network. A strong password contains at least 10 characters and includes numbers, symbols, and capital and lowercase letters. You also should change your passwords regularly.
4. Connect to secure Wi-Fi
When you’re working remotely, you can help protect data by using a virtual private network (VPN), if your company has one. A VPN is essential when doing work outside of the office. Some VPNs are safer than others. If your company has a VPN it trusts, make sure you know how to connect to it and use it
5. Enable firewall protection at work and at home
Having a firewall for your home network is a first line of defense in helping protect data against cyberattacks. Firewalls prevent unauthorized users from accessing your websites, mail services, and other sources of information that can be accessed from the web.
6. Invest in security systems
All of the devices you use at home should have the protection of strong security software. Alert the IT department or Information Security manager if you see anything that might indicate a security issue. There may be a flaw in the system that the company needs to patch or fix. The quicker you report an issue, the better.
7. Install security software updates and back up your files
Keep your security software, web browsers, and operating systems updated with the latest protections, Anti-virus and anti-malware protection are frequently updated to respond to new cyberthreats. If ACD sends out instructions for security updates, install them right away. Secure and back up files in case of a data breach or malware attack. Contact IT if you need to know how to back up your data.
8. Talk to the IT department
Reach out to your IT support team about information security. It’s a good idea to work with this department if something like a software update hits a snag. Don’t let a simple problem become more complex by attempting to “fix” it. If you’re unsure, IT can help. It’s also smart to report security warnings from your internet security software to IT. They might not be aware of all threats that occur.
Beware of tech support scams. You might receive a phishing email from someone claiming to be from IT. The goal is to trick you into installing malware on your computer or mobile device or providing sensitive data. Don’t provide any information. Contact the IT department right away.
9. Use third-party controls
It’s common for data breaches to begin from within companies. That’s why organizations limit employee access to customer and client information. Be sure to implement and follow ACD rules about how sensitive information is stored and used.
10. Embrace education and training
Your responsibilities include knowing your company’s cybersecurity policies and what’s expected of you. If you’re unsure about a policy, ask. Follow ACD’s Acceptable Electronic Use (AEU) policy. Be sure to use authorized applications to access sensitive documents.
Knowledge by Tool Technology and Support Information Security
-
Updating Your Personal Information within ACES
Updated onArticleUpdating your personal information in ACES is essential in order to login, bypass Multi-Factor Authentication (MFA), and receive important updates regarding your account.
Knowledge by Tool ACES Employee Resources
-
Multi-factor Authentication (MFA) for ACES
Updated onArticleMulti-factor Authentication (MFA) is a security protocol requiring additional authentication factors, and it ensures an added layer of security to your account. Once MFA is enabled, it will be required to access ACES each time you login.
Knowledge by Tool ACES Employee Resources
-
Setup ACES Security Questions
Updated onArticleSecurity questions give an added layer of protection to your account and allow you to update your password at any time without calling the help desk. In order for you to self-reset your password, you must set up security questions first.
Knowledge by Tool ACES Accessing Content
Article also found in:
-
How to Use Breakout Rooms in Teams Meetings
Updated onArticleIn large team meetings, sometimes it can be difficult to have open discussions and a meaningful exchange of ideas. Create breakout rooms to bring participants into small groups for interactive conversations and brainstorming sessions.
Note: Only meeting organizers on the desktop versions of Teams (Windows and Mac) can create and manage breakout rooms.
Knowledge by Tool Microsoft Microsoft Teams
-
Upload and Share a File on Adobe Acrobat Online
Updated onArticleAlamo Colleges employees can use Adobe Web for uploading and sharing documents securely and efficiently. By utilizing this platform, they can collaborate seamlessly, ensuring easy access to important files while maintaining data integrity. Adobe Web's features enable streamlined document management, enhancing productivity and facilitating effective communication among team members.
Knowledge by Tool Adobe Adobe Creative Cloud
-
Organize Pages in Acrobat Online
Updated onArticleThe Acrobat Organize Pages tool simplifies PDF management by allowing users to reorder, insert, delete, extract, and rotate pages all in one place. It enables effortless rearrangement of pages. You can insert new pages, import content from other files, and delete unnecessary pages, streamlining the process of building long form documents with multiple pages.
In this guide, we will walk you through how to reorder, add, delete, and rotate multiple pages.
Knowledge by Tool Adobe Adobe Acrobat