Clayton State’s Information Security collaborates with faculty, staff and students to keep campus computing systems running smoothly and important data protected and secure.
Information Security secures data and infrastructure protecting confidentiality, availability and integrity.
Security & Awareness Training: Training and awareness are the cornerstones of information security. All CSU faculty and staff are required to take annual information security awareness training.
Campus information security infrastructure: Clayton State information security infrastructure consists of tools and equipment which protect data, systems and networks. CSU campus infrastructure is designed to be as unobtrusive as possible while still maintaining a high degree of protection against malware, hackers, and data breaches.
There are many information security threats that we need to be aware of and protect against in order to ensure our sensitive information remains secure. False alarms can cause more problems than the real event, so educate yourself on what is - and, just as importantly, what isn't - a threat to computer security.
Identity management is an important aspect of information technology security. Employee logins are requested by Human Resources at the time of hire and are terminated when Human Resources notifies ITS the person is no longer employed. Accounts will not be created without Human Resources requesting them.
All users, whether internal, external, or temporary, and their activity on all IT systems should have User Ids that:
Threat landscape. Malware, viruses and bots can come from any direction. Staying on top of alerts, strong passwords, and keeping your operating system and antivirus software current on updates will go a long way to help.
Email is provided as a tool to assist and facilitate state business, communications with students, faculty, and its representatives to conduct official Clayton State University business. Email is one of the most important information technologies. Email is the number one conduit malicious entities use to compromise accounts and systems.
Phishing scams. Attempts by hackers and noncriminals to steal personal information or hijack computing resources for nefarious purposes by deception. Spam is also used by criminals to steal assets. Spam is so cheap to send that spammers only need a few sales to make a profit; some reports now put the percentage of email that's spam at 95% and rising. The only way to stop spam is for everyone in the world to not respond.
Viruses and malware. Malware includes viruses, worms, trojan horses, spyware, adware, scareware, rootkits, exploits, and any other piece of software designed to disrupt, destroy or steal valuable information.
P2P file-sharing & copyright violations. Learn how to avoid the pitfalls and potential sanctions associated with unauthorized file-sharing.
When you start college, you’re taking on new responsibilities, making your own decisions, and becoming part of the campus community. There is an important role that you can play in your college's cybersecurity efforts that combines these elements of responsibility, decision-making, and community.
When you’re in college, your computer and mobile devices are primary tools in your educational and social life. Students use the Internet for homework, research, social networking, online shopping and other activities.
The Internet is an amazing tool, but must be used safely and securely.
When you log on to the campus network (or any network), what you do online could impact not only your computer, but other students and the network as well. By combining up-to-date security tools with good judgment, you and your college community are much less likely to encounter a security violation, loss of data, or system problems.
The first step is STOP. THINK. CONNECT.
Keep a Clean Machine
Protect Your Personal Information
Connect With Care
Be Web Wise
Be a Good Online Citizen
The single most important way to protect yourself and others against cybercrime is simple - keep your passwords secret. Never share your passwords with anyone! No one at CSU, will ever ask for your password, not even the HUB.
Annual Credit Report Monitoring . You are entitled to a free copy of your credit report from each of the three national consumer credit reporting agencies on request once a year. It is an important step in helping to prevent identity theft.
You can help to protect yourself against identity theft by reviewing your credit report at least once a year. The Fair Credit Reporting Act (FCRA) requires that each of the three national consumer credit reporting companies — Equifax, Experian, and TransUnion — provide you with a copy of your credit report on request once every 12 months at no charge.
The Federal Trade Commission (FTC) enforces the FCRA, which promotes the secure maintenance of accurate information by the consumer credit reporting companies.
By regularly checking your credit report, you can
The three consumer reporting companies have set up a central website, toll-free telephone number, and mailing address through which you can order your free annual report. Go to annualcreditreport.com, call 1-877-322-8228, or download the Annual Credit Report Request Form and mailing it to:
Annual Credit Report Request Service
P.O. Box 105281
Atlanta, GA 30348-5281
Note that the only website authorized to fill orders for the free annual credit report you are entitled to under law is annualcreditreport.com. Other sites will similar names may charge a fee and/or not provide reports from all three agencies.
5 ways to avoid being hacked. A cautionary video and news story gives quick tips on how to avoid being hacked.
Protecting confidential information. "Protected information" is an umbrella term used at CSU to describe information linked to an individual person's identity, such as their Social Security number, driver's license data, and credit card or bank account information (sometimes called Personally-Identifiable Information, or PII) which can be used to facilitate identity theft.
Keep your system up-to-date. Today's security threats are heavily focused on exploiting vulnerabilities in common operating systems and applications, so one of the most important ways you can keep your information safe is to ensure that your OS, browser, and other widely-used applications such as Adobe's Acrobat Reader are kept up to date.