Cybersecurity Training Happening this month

LLCC’s cybersecurity awareness training program for the 2024-2025 training year with Infosec IQ runs through Nov. 30.

The training will include four short training videos and assessments. During the campaign, a series of simulated phishing emails will also be sent out. The courses in the fall module include social engineering, multi-factor authentication, data privacy, and incident response. The purpose of this training is to raise awareness of the threats in our environment to avoid costly data breaches.

Everyone receiving the email notification is required to complete this training by Nov. 30. Failing to comply may result in loss of LLCC network access privileges and disciplinary action per board policy “8.6 – Employee Discipline”.

On Friday, Nov. 1, you received an email notification of enrollment in the course from Infosec IQ Notifications <notifications@securityiq-notifications.com> with the subject “Start your security awareness training.” The link provided in that email will take the learner directly to their dashboard to complete the module.

Cybersecurity Training Begins Friday

LLCC’s cybersecurity awareness training program for the 2024-2025 training year with Infosec IQ begins Friday, Nov. 1 and runs through Nov. 30.

It will include four short training videos and assessments. During the campaign, a series of simulated phishing emails will also be sent out. The courses in the fall module include social engineering, multi-factor authentication, data privacy, and incident response. The purpose of this training is to raise awareness of the threats in our environment to avoid costly data breaches.

Everyone receiving the email notification is required to complete this training by Nov. 30. Failing to comply may result in loss of LLCC network access privileges and disciplinary action per board policy “8.6 – Employee Discipline”.

On Friday, Nov. 1, you will be sent an email notification of enrollment in the course from Infosec IQ Notifications <notifications@securityiq-notifications.com> with the subject “Start your security awareness training.” The link provided in that email will take the learner directly to their dashboard to complete the module.

Congratulations to Nancy Brawner on her promotion and welcome to Alex Wray

Congratulations to Nancy Brawner, who was promoted to course materials coordinator at the LLCC Bookstore.

LLCC Information Technology welcomes Alex Wray to the team. Alex started with LLCC back in April as a contractor and accepted a full-time position as a network administrator on Sept. 16. Alex is an LLCC alum, having graduated in 2022. Before coming back to LLCC, he worked in managed services at LRS. Welcome home Alex!
Nancy BrawnerAlex Wray

RECIPE FOR CYBERSECURITY: Enabling multi-factor authentication

Authentication to suit your taste

Recipe for CybersecurityWelcome to week 4! Multi-factor Authentication (MFA) is just like cake — the more layers the better! When MFA is enabled, it will require anyone logging into an account to navigate a two-step process to prove their identity — usually via a push notification.

How it works: When logging into your account, you first provide your password or passphrase. Next, you will provide an extra way of proving that you’re you; this is typically done through:

  • An extra PIN (personal identification number)
  • An extra security question like, “What’s your favorite pet’s name?”
  • An additional code, either emailed or texted
  • A biometric identifier like facial recognition or a fingerprint
  • A unique number generated by an “Authenticator App”
  • A secure token is a separate piece of hardware (like a key fob that holds information) that verifies a person’s identity with a database or system

Look for this week’s Recipe for Cybersecurity poster on bulletin boards around campus. Thank you for being the key ingredient in our recipe for cybersecurity success!

We extend our condolences

We extend our sympathy to Samuel and Tamie Penning, systems administrators in information technology, on the loss of Samuel’s mother Debra Sue Smith Penning on Oct. 7. A private remembrance is being planned for a later date. Read the obituary.

Additionally, we offer our condolences to Sara Bachmann, instructor of nursing, on the passing of her brother, Joseph Duncan Irwin, on Oct. 14. Read the obituary.

RECIPE FOR CYBERSECURITY: Updating software

Top your device off with a fresh update.

Recipe for CybersecurityWelcome to week 3! Spice up your system with the latest updates and patches. Updates are free to download, and they stop your security from becoming stale.
Please Note: When downloading a software update:

  • Only get it from the company that created it. Hacked, pirated, or unlicensed software versions often contain malware and cause more problems than they solve.
  • Make sure the software or application you’re updating is approved by your organization. If you are unsure, please contact our team.

Chef tip: Where applicable, turn on automatic updates. When an update is available, it will remind you so you can easily start the process.

Look for this week’s Recipe for Cybersecurity poster on bulletin boards around campus. Thank you for being the key ingredient in our recipe for cybersecurity success!

RECIPE FOR CYBERSECURITY: Using strong passwords and a password manager

Recipe for CybersecurityKey to a successful cybersecurity recipe: Strong and unique passwords

Welcome to Week 2 of Cybersecurity Awareness Month! It is important to always use a unique password for each of your online accounts. Don’t reuse the same password across websites. If one of those sites gets compromised, hackers will try that password on other sites. No matter the account, all passwords should follow these preparation steps:

  • The more characters you use the better (at least 12 characters)
  • Never reuse passwords. Each account needs its own unique password.
  • Use a combination of upper and lowercase letters, numbers and special characters. Some websites will even let you include spaces.
  • Use a random password generator paired with a password manager for extra security.
  • Look for this week’s Recipe for Cybersecurity poster on bulletin boards around campus.

Thank you for being the key ingredient in our recipe for cybersecurity success!

RECIPE FOR CYBERSECURITY: Recognizing and Reporting Phishing

Recipe for CybersecurityDon’t Get Burned by Scam Emails

Phishing makes up 44% of social engineering incidents, and 98% of phishing incidents are via email. But it isn’t enough to simply know that phishing emails are out there; you also need to be able to recognize and report them. Here are some chef tips on how to clearly spot a fake phishing email so you don’t get burned:
  • Emails that contain an offer that’s too good to be true
  • Language that’s urgent, alarming, or threatening
  • Poorly-crafted writing with misspellings and bad grammar
  • Greetings that are ambiguous or very generic
  • Requests to send personal information
  • Urgency to click on unfamiliar hyperlinks or attachment
  • Strange or abrupt corporate communications
  • Sending email address doesn’t match the company it’s coming from

When you smell phish, report it immediately – or you might get burned. Report it to the LLCC Help Desk. Read more about Cybersecurity.

Look for this week’s Recipe for Cybersecurity poster on bulletin boards around campus. Thank you for being the key ingredient in our recipe for cybersecurity success!