The Information Security Department at Collin College is committed to safeguarding the confidentiality, integrity, and availability of information assets within our academic community. Our mission is to create a secure and resilient digital environment by implementing robust security measures, fostering awareness, and promoting a culture of responsible information handling.
Technology/Security Practices
All employees and students of Collin College have a responsibility to protect their Collin device (desktop, laptop, tablet, etc.). We are on the front line and must use best practices when it comes to protecting our data and our network. Please review the helpful tips and reminders below on ways to reduce the risk of a cyberattack.
Collin College Technology Services recommends that all computer users regularly back up their data in order to prevent information loss in the case of a disk failure or a natural disaster. At minimum, we recommend backing up files that are frequently updated.
Your Collin College desktop or laptop device must be protected at all times. Technology Services does a lot already to help protect your devices on our network (firewall, patching, multi-factor authentication (MFA), etc). However, each of us are responsible for protecting our own device and the data it contains.
Here are a few tips:
- Select a strong password or passphrase (a phrase or sentence that is only meaningful to you).
- Ensure your password/passphrase is not one you use for personal use!
- Never share your password/passphrase!
- Never write your password/passphrase on a sticky note that you leave near your device nor under your keyboard.
- Browse the web safely
- Do not click on suspicious email link or open suspicious attachments
- Never leave your device unlocked when you walk away.
- Shutdown your device when going on vacation.
- Do not leave your laptop or any other mobile device unattended!
For any questions or concerns regarding this information, please contact the Collin College Technical Support HelpDesk.
A firewall is a partition that protects, filtering network traffic so that harmful traffic never makes it into a secure, internal network. View a firewall security video.
If you know you did not buy a couple of 75” Samsung Neo 4K Smart TVs, why are you calling “Best Buy”??? Oh, that’s right, you received an email that says you ordered them and to call their “number” if you need to talk to their “Best Buy Customer Service”. Do not fall for it! It could have been an Amazon email or text message… Phishing is still the top attacking vector used for stealing your login credentials, banking info, both personal and company data, and more!
Here are a few tips to stay safe:
- Did you expect to receive the email?
- Do you know the sender?
- Did you verify the complete email address of the sender?
- Does the email’s tone invoke Urgency, Fear, Immediate Action Required?
- Legit companies will not request sensitive information via email.
- Did the email address you by name or just a generic greeting such as “Dear Sir/Ma’am”?
- Do not click on suspicious email links or open suspicious attachments.
- Hover over the link with your mouse cursor to help verify the validity of the link.
- Look out for misspellings, bad grammar, bad syntax.
- Use the Phish Alert Button (PAB) to report your suspicious email.
- Stop! And Think Before You Click!
For any questions or concerns regarding this information, please contact the Collin College Technical Support HelpDesk.
File Sharing is the practice of providing sharing access to various file types including documents, music, videos, images, etc. The File sharing process occurs when moving/copying one or more files to another computer or remote location. While the allure of free content is tempting, they carry a number of risks:
- Many of the free file sharing services carry viruses!
- If you download and run one of these malicious files, you will infect your device.
- The infected device may redistribute the malicious file to others on the network.
- Another risk of file sharing is the violation of copyright infringement.
- If you download and distribute files with file sharing services that are copyrighted,
the activity
will be monitored by copyright holders. - You are not anonymous and your IP address can be tracked.
- If caught, you will receive a cease and desist statement by your Internet Service Provider (ISP)
For any questions or concerns regarding this information, please contact the Collin College Technical Support HelpDesk.
Learn tips how to stay safe when surfing the web on public WiFi. View a wireless security video.
Policies, Plans, Procedures, and Processes
- Backup Recovery ISP
- Building Access Operational ISP
- Communications ISP
- Computer Compliance ISP
- Data Privacy ISP
- Desktop Security ISP
- Firewall ISP
- Incident Response Plan ISP
- Police Department Media Destruction ISP
- Privacy ISP
- Risk Assessment ISP
- Security Camera and Surveillance ISP
- Server Administration ISP
- Software Currency ISP
- User Passwords ISP
Report an Incident
Student Technical Support
Visit: Student Technology Support
Email: studenthelpdesk@collin.edu
Call: 972.377.1777 (Available 24x7)
Faculty/Staff Technical Support
Visit: Employee Technology Support
Email: helpdesk@collin.edu
Call: 972.548.6555 (Monday - Friday, 7 a.m. - 6 p.m.)
