Technology Security
Some best practices include:
- Protect personal information - this includes general Cuesta information, student information, and your own information.
- Only use your @cuesta email address for work related purposes.
- If you register with a third-party provider for work related activity, create a unique password for the account that is not the same as what you use to login to your Cuesta systems (i.e. myCuesta, Canvas, etc.)
- If you are registering an account with a third-party provider for personal use, always use a personal email for registration.
- Save files and data thoughtfully - your Cuesta provided OneDrive and department shared file locations (i.e. Teams, SharePoint or Network drives) are dependable data storage locations.
- Click with care! - clicking on unsolicited/unfamiliar links is always risky. If you are ever unsure, contact the sender by phone or through a separate email to confirm the request or send an email to usersupport@cuesta.edu for assistance.
- Lock your computer screen - use Windows key + L on a PC or Command key + Q on a Mac to lock your screen anytime you walk away from your computer/device.
- Beware of Phishing Emails. Look out for:
- Sender addresses outside the Cuesta domain (not @cuesta.edu)
- Misspellings, poor punctuation, typos or strange formatting
- Unfamiliar tones or word choice
- Subject lines that begin with [EXTERNAL]
- Unusual signature lines
- A sense of urgency