Cybersecurity Awareness

We live in a highly connected world where the Internet impacts almost every aspect of daily life. The Office of Information Technology takes cyber threats seriously, using a multi-layered approach to protect data and technology resources from unauthorized access and malicious attacks. This page aims to engage and educate you about cybersecurity, providing the information needed to stay safe online.

LCTCS Cyber Security Program

The LCTCS Cyber Security Program has made available to each LCTCS institution, the KnowBe4 Security Awareness and Training Portal. KnowBe4 was initiated to help familiarize employees with 'social engineering' attack techniques designed to trick them into clicking on fraudulent links or opening malicious attachments in emails. All Delgado employees are required participate in the mandatory training on a quarterly basis. In addition to security training, simulated phishing emails will be sent regularly to help you practice the skills learned as part of your training. View login instructions to the KnowBe4 Security Awareness Training.

KnowBe4 Remote Work Awareness/Preparedness

Scam Alert Work from Home Tips

Taking Security Home Working Remotely 

  

Important Cybersecurity Terms

Adware

Adware is a free software that is supported by advertisements. Common adware programs are toolbars that sit on your desktop or work in conjunction with your Web browser. They are free to use, but require you to watch advertisements as long as the programs are open. Most adware is safe to use, but some can serve as spyware, gathering information about you from your hard drive, the Web sites you visit or your keystrokes. Spyware programs can then send the information over the Internet to another computer.

Cyberthreat

The possibility of a malicious attempt to damage or disrupt a computer network or system.

DoS Attack

In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer.

Graymail

Graymail is email you opt to receive but rarely open or click through. For example, you might provide your email at checkout to receive deals, but eventually ignore the store's emails. Graymail includes newsletters, promotional emails, and announcements that you continuously ignore. Internet service providers identify graymail based on recipient engagement. Unlike spam, which is unsolicited and often harmful, graymail is sent with your permission and is generally harmless. Companies such as Gmail and Hotmail have products to manage graymail, often routing it to folders like Promotions.

Malware

Short for “malicious software,” malware refers to software programs designed to damage or do other unwanted actions on a computer system. Common examples of malware include viruses, worms, Trojan horses and spyware. Viruses, for example, can cause havoc on a computer’s hard drive by deleting files or directory information. Spyware can gather data from a user’s system without the user knowing it. This can include anything from the Web pages a user visits to personal information, such as credit card numbers.

Ransomware

Ransomware is a form of malware that targets users’ systems and critical data for the purpose of extortion. Ransomware is frequently delivered through spearphising emails. After the user has been blocked from accessing his or her data, the ransomware operator demands a payment. After receiving payment, the ransomware operator usually provides an avenue for the victim to regain access to the system or data. However, paying the ransom does not guarantee the encrypted files will be released.

Spam Text Messages

Spam text messages, also known as phishing texts or SMS spam, are unsolicited messages meant to scam you into revealing personal data. They often promote products, services, or scams. These texts appear to be sent by a trusted organization, business, or even a family member, making it tricky to identify them. 

Spearphising

Spearphishing (or ‘Phishing’) is an attempt made by an individual or group to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal or other banking institutions. The e-mails state that your information needs to be updated or validated and ask that you enter your username and password, after clicking a link included in the e-mail. Some e-mails will ask that you enter even more information, such as your full name, address, phone number, social security number and credit card number.

Vishing

Vishing, or voice phishing, or voice phishing, is a type of scam where fraudsters use phone calls to trick individuals into revealing personal information, such as banking details or passwords. These scammers often pose as legitimate entities, like banks or government agencies, to gain trust. It's important to be cautious when receiving unsolicited calls and never share sensitive information over the phone unless you can verify the caller's identity. If you suspect a vishing attempt, hang up and contact the organization directly using a verified phone number.

Summary

These are just a few of the common cyber threats we face daily. While some of us may not experience these types of attacks, it is important to remember that they are real. Unfortunately, there is no “cure-all” solution for such scams. If you have doubts about the legitimacy of an email, please do not reply, click on any links, or provide personal information. Instead, reach out to the Office of Information Technology at 504-671-5500 or email us at dcchelpdesk@dcc.edu.