Lake Michigan College

Welcome to the LMC Information Technology

Besecure

Helpdesk phone: 269-927-8189 email: ithelpdesk@lakemichigancollege.edu

Office Hour: Monday - Friday, 8 am - 5 pm

Data Security Awareness SSN / Emails by LMC COLLEGE on GoAnimate

LMC Threat Matrix

Ref# Threats Concerns Risk
1 Internet and E-Mail Security These attacks are tied to Internet and e-mail safety and social engineering attacks. They generally involve convincing e-mails that attempt to solicit sensitive information from victims High
2 Passwords Passwords are the front-line protection for all systems, programs, and information. Ensure that end users are complying with the organization’s Password Policy to protect individuals and the company as a whole. Medium
3 Phishing and Pharming These attacks are tied to Internet and e-mail safety and social engineering attacks. They generally involve convincing e-mails that attempt to solicit sensitive information from victims. High
4 Social Engineering Attacks These attacks are targeted and can take on many forms. It is important that employees are able to recognize these attacks when they occur and know how to deal with them. High
5 Telephone Security End users may inadvertently disclose confidential company information when using telephones in public areas. Ensure that end users are aware of what they can and cannot say in public spaces. Medium
6 Confidential data protection Companies that house sensitive data and information are at risk for inadvertently exposing this information to third parties. End users should be aware and adhere to the company’s confidential data policy. High
7 Wireless Security If you use wireless devices, especially in public settings, then you should teach your employees about wireless security. Employees should know the risks and should also have the necessary tools to ensure that they are safe, for example using encryption and VPN. Medium
8 Physical Security Take steps to ensure that your end users know how to avoid physical security risks. These include: using laptop locks, not leaving mobile devices in places that would encourage theft, and ensuring that only the organization’s employees have access to the facilities. Medium

Submit an Online Ticket

Click here to submit an online support ticket.

Submit Request