By Dr. Carolyn Lightfoot, Chief Technology Officer
With the proliferation of computers around the world then coupled that with virus’s spreading from sharing floppy disks in the early 1980’s on network computers, hackers have been trying ever since to bring down computer systems. Whether it was meant as a joke, game or just nuisance, mischievous folks have been finding ways to hack computer systems and most times we are unaware of malicious code on our computer.
The rush to be “webvergence” (which is the converging of voice, data and video on the Web) has introduced many different avenues for spyware and key-loggers to attack computer systems leaving them wide open to identify theft and internet predators.
Every day the local news station top stories are about the latest computer security threats from virtually unknowns due to the anonymous nature of the internet. Cyber-crime is on the increase targeting unsuspecting people via phishing scams, spyware, identify theft and internet predators. We have seen attempts by hackers to compromise computer systems information as a direct result of focused attacks.
Lee College is constantly working to improve computer security using best practices including user awareness of security issues, promoting the use of security tools and providing workshops and conferences to our students and community. The unfortunate reality today is that cyber crime on the rise and is here to stay.
Cybersecurity takes all of us working together to counter cyber attacks by keeping abreast of vulnerabilities and being aware of your surroundings, internet activity, suspicious e-mail attachments and offers just too good to be true! You never know who or what’s lurking between the bits and bytes!
Lee College Network
We support Ethernet and AppleTalk high-speed data networking to the desktop.
Information Technology routinely scans the campus network for computers with known vulnerabilities. This scanning is done as unobtrusively as possible. Lee College utilizes Intrusion Detection, Firewalls, ISA, WUS, Filtering, Packet Shaping, DMZ and Radius ACS and numerous other security measures to help detect and respond to information security incidents involving computers connected to the campus network.
The Information Technology office has responsibility for centralized computing, telephony, network infrastructure including over 2,500 network connections and enterprise database management systems in the areas of finance, human resources and student administration.
Security News & Alerts
Information Technology Security Policy, Copyright and FERPA
Cyber Safety Tips
- Make sure you regularly update your anti-virus software.
- Access Microsoft Windows current updates and patches.
- Use strong passwords (letters, numbers and symbols). Try Password Checker to see if your password passes the test.
- Do not share passwords.
- Disable remote access.
- Encrypt your sensitive files.
- Protect your identity! NEVER give out personal information to a stranger.