Skip to Main Content

Security Practices for Remote Working

A guide from the Information Security Center provides recommended steps and resources to help colleges address security when staff and faculty work remotely with sensitive information. Specific areas of focus include social engineering, home network security, passwords, and software updates.

Download

A man looks at his computer monitor while working from home.

Information Security Workshops

Registration is open for the Summer Information Security Workshop: Monday, June 13, 2022. Offered twice each year, our full-day online workshops are designed specifically to meet the professional development needs of California Community Colleges information technology personnel.

Workshop Information

A group of people look forward watching a presentation.

White Paper: Managing Information Security on Campus

A white paper from the Information Security Center explores the security needs of the California Community Colleges (CCC), and the resources we provide to help college leaders secure their systems and protect users' information.

Read More

A man and a woman are crouched down working on servers.

Information Security Services: Scanning, Monitoring, Policies

The CCC Information Security Center works directly with the CCC technology community to understand IS priorities and develop appropriate services, including vulnerability scanning, service monitoring and IS policies.

Read More

infosec services slider 912x340

Services

We provide training, vulnerability scans, tools, server monitoring and more

About Us

The top information security priorities and our commitment to the CCC

ISAC

Learn more about the Information Security Advisory Committee

What We Do:

The California Community Colleges Information Security Center proactively assesses the information security needs of the system, and offers services to CCC campuses designed to maintain the integrity of information systems by:

  • Understanding CCC IS priorities
  • Offering free vulnerability scanning
  • Developing IS policies & procedures
  • Promoting IS awareness
  • Publicizing important IS information

More Info

Top Stories

digitized pad locks

Colleges Paying Ransom Only Get 60% of Data Back, Study Finds

Paying a ransom doesn't guarantee you get all of your data back. Here's how to prepare for the worst. ... Read story at University Business

CISA and MS-ISAC Ransomware Guide - September 30, 2020

CISA & MS-ISAC Ransomware Best Practices Guide

Ransomware recommendations based on operational insight from government-based cybersecurity experts ... Download the Ransomware Guide

Network security concept

Tips for Staffing & Training a Cyber Incident Response Team

Of all the cybersecurity solutions created to prevent breaches in higher ed, it's the people on the incident response teams who are most vital ... Read story at EdTech