An email invitation for Cybersecurity Awareness training was sent to faculty and staff on Oct. 4. On Nov. 8, a reminder will be sent to those who haven’t completed the training. This annual training, required by state statute, introduces basic computer security concepts and good security practices and takes approximately 30 minutes to complete.
Each person receives a unique link for the training and the link shouldn’t be shared with others. Also, it is best to set enough time aside to complete the training in one setting. Some have ran into problems when trying to return to complete a partially completed survey.
If you haven’t completed the training and you didn’t receive a reminder, check in the Junk folder and the Other folder (at the top of the inbox if using Outlook on the Web). If you still don’t see a reminder, contact the IT Help Desk (firstname.lastname@example.org) and we will troubleshoot.
Once the training has been completed, it will be added to your training summary in HRIS.
The lines between our work and daily lives are becoming increasingly blurred, and it is more important than ever to be certain that smart cybersecurity practices carry over between the two. Online security is a shared responsibility.
Here are some tips that can make you safer and more secure at work and at home:
- Keep a clean machine. Having the latest security software, web browser, apps and operating system is the best defense against viruses, malware and other online threats. Remember, mobile phones, point of sale systems and tablets need updating too!
- Lock down your login. Enable the strongest authentication tools available for your online business accounts, such as biometrics or a unique one-time code through an app on your mobile device. This security feature is also available on personal accounts such as email, bank and social media.
- Back It Up. Put in place a system – either in the cloud or via separate hard drive storage – that makes electronic copies of the vital business information on a regular basis. At home, make regular backups of all your important docs, files and photos.
- Bring Your Own Device (BYOD). Now more than ever, employees are using their personal smart devices – such as PCs and smartphones – for work purposes. It’s important to consider where sensitive company, customer and/or employee data is being accessed and implement
a policy to BYOD use.
- When in Doubt, Throw it Out. Whether at work or in their personal lives, employees should know not to open suspicious links in email, tweets, posts, online ads, messages or attachments – even if they know the source.
- Cybersecurity in the Workplace is Everyone’s Business. It’s not just the job of IT staff or business owner to ensure online safety at work. Creating a culture of cybersecurity includes ALL employees knowing how to protect themselves and the organization and understanding the cyber risks as the business grows or adds new
technologies or functions.
K-State faculty and staff must complete Cybersecurity Awareness training by Dec. 31. You will receive an email with a link to the online training on Thurs., Oct. 4. If you use Outlook on the Web and you don’t see the training invitation in your Focused inbox, check your Other folder.
Cybersecurity awareness training is an important part of K-State’s strategy to protect our information systems and data. “We ALL have a responsibility to protect the information assets entrusted to us. Everyone at K-State serves a critical role in protecting K-State data”, said Chad Currier, K-State’s chief information security officer.
This training, required by state statute, introduces basic computer security concepts and good security practices and takes approximately 30 minutes to complete.
Once you complete the training, your personnel record in HRIS will be updated. It will be listed under the Training Summary as Cybersecurity Awareness 2018, with the course code WIT590.
If you have questions about the security awareness training, contact the IT Help Desk at email@example.com or 532-7722.
You exist in digital form all over the Internet. It is important to ensure that the digital you matches what you are intending to share. It is also critical to guard your privacy — not only to avoid embarrassment but also to protect your identity and finances!
Following are specific steps you can take to protect your online information, identity, and privacy. Continue reading “IT Security Awareness: Keep what’s private, private”
Today begins National Cybersecurity Awareness Month (NCSAM). Register for the “State of IT Security at K-State” presentation and join us from 1;30 -2:30 p.m. today. After you register, you will receive a Zoom meeting invitation.
Some highlights that will be covered include:
- What’s in store for Cybersecurity Awareness Month
- What K-State has seen – Attack Metrics
- Where K-State is going
- How every K-Stater can help
Send any questions or suggestions about NCASM to Cathy Rodrigeuz (firstname.lastname@example.org) See the K-State It Security Awareness Month web page to keep up-to-date on the latest details.
Follow us on Twitter to stay involved with all the activities throughout the month of October.
October marks the fifteenth annual National Cyber Security Awareness Month
(NCSAM) sponsored by the Department of Homeland Security. The goal of NCSAM is to increase the awareness of the cybersecurity landscape and to bring awareness to various strategies we all can use to keep our information protected. It is our shared responsibility to protect ourselves, our colleagues, our family members, and K-State’s valuable information and technology resources.
Information Technology Services is sponsoring various events and activities throughout the month of October including:
- Conducting presentations/training.
- Providing sessions for various student clubs on careers in information security and information technology.
- Sharing tips and best practices via K-State Today and Twitter.
- Hosting Shred Day.
- Encouraging the campus to participate by spreading the word of how to stay safe online.
- Culminating in “Dark Tales from the Net” – a discussion of horror stories about sharing too much information.
- And more.
On Mon., Oct. 1, ITS will kick off the month with a State of IT Security presentation by Chad Currier, Chief Information Security Officer.
This presentation will be 1:30-2:30 p.m. Registration is required. After registering, you will receive a confirmation email containing information about joining the webinar.
How can you get involved?
- Attend events.
- Follow us on Twitter. Help us spread the word by retweeting using the hashtag #CyberAware.
Qualtrics surveys can be used for event registrations, satisfaction surveys, online forms, academic research, training, and more. Join us for an Introduction to Qualtrics training session from 3-5 p.m., Wed., Sept. 19, in 306 Calvin Hall. All students, faculty, and staff who use this research suite are welcome to attend.
Topics to be covered:
- Create and manage surveys
- Customize the look and feel
- Collaborate with others
- Use block options and survey flow
- Use display and skip logic
- Distribute a survey
- Run and analyze reports
Graduate and undergraduate students must work with an advisor/supervisor for access to Qualtrics using this request form.
Limited free printing is available and has been doubled for the fall 2018 semester to $20/person which translates to about 200 black and white pages. Beyond those amounts, the Wildcat Card can be used for pay-for-printing. Unused balances do not carry forward to the next semester.
Print your syllabi at any of the following locations:
- Business Building – floors 1–3 near elevator
- Business Building – room 3121, Computer lab
- Dickens Hall – room 1, Computer lab
- IT Help Desk – Cat’s Pause Lounge, K-State Student Union, room 222
- Justin Hall Lounge
- K-State Student Union Open Lab – 1st floor
- K-State Student Union Welcome Desk – 1st floor
- Math/Physics Library – Cardwell Hall, room 105
- Media Center – Seaton Hall, room 1
- Weigel Library – Regnier Hall, room 0081
See the Service Locations by Category and Printing on campus web pages for more details.
Microsoft is retiring Outlook on the Web (OWA) mobile apps for iPhone, iPad and Android on May 15, 2018. You should begin using the Outlook app for iOS and Android.
Mobile device requirements
- Windows: Office Mobile applications (Word, Excel, PowerPoint, OneNote, Outlook Mail, and Outlook Calendar) require Windows 10.
- iOS: Office for iPad and iPhone requires iOS 10.0 or later. Office for iPad Pro requires iOS 10.0 or later.
Android: Office for Android can be installed on tablets and phones that meet the following criteria: running Android KitKat 4.4 or later version and have an ARM-based or Intel x86 processor.
Mobile browsers: Any mobile browser supported by Microsoft may be used.
While walking through the halls of one of the buildings on campus late one evening, a nefarious individual found green bar sheets in a box outside an office. The interloper took a closer look and found the mother lode, green bar sheets with names, SSNs and grades. The individual uses the information to steal the identity of more than one student.
The above scenario is not that far-fetched. Sensitive information is often found discarded in the office trash cans, dumpsters and in hallway receptacles.
While we may have quit printing green bar sheets years ago, they still surface along with other documents, and sometimes they surface in the halls, unattended. Make it a practice to shred documents with sensitive information. Documents to shred include:
- Scantron forms
- Greenbar grade sheets
- Rosters printed from K-State Online, iSIS, etc.
- Student papers with personal identity information and grades
- Data with credit card information and canceled checks
- Personnel files
- Other sensitive papers with identity or financial information
Betsy Draper, Interim Chief Information Security Officer, suggests, “If you are in doubt about shredding, err on the safe side and shred anyway.”
If you have a large amount to shred and would like to contract the work out, Document Resources Inc. is on state contract.