Information Security Awareness for New Gadsden State Community College Employees
What is Information Security?
Information Security (InfoSec) is the prevention of unauthorized access, use, disclosure, disruption,
modification, inspection, recording or destruction of information.
Please note that InfoSec is concerned with all forms of data, not just electronic data.
________ (Please initial here to indicate that you understand the above)
Why is Gadsden State concerned about Information Security?
Gadsden State is concerned about InfoSec because we recognize the extreme value of the data we are
entrusted with. Additionally, we recognize that the modern cyber-landscape is not a friendly place for
lax security. We also strive to adopt best practices and be the best stewards of institutional data we can
be. Lastly, adequate InfoSec policy and procedures are mandated by the federal government and is
essential for Gadsden State to keep Title IV federal financial aid.
________ (Please initial here to indicate that you understand the above)
What type of threats is Gadsden State vulnerable to?
Internally, Gadsden State is vulnerable to threats such as unsecured work areas, unsecured portable
devices, and lax enforcement of established policies.
Externally, Gadsden State is vulnerable to threats such as cyber-attacks, malware (spyware,
ransomware, etc.), and social engineering.
________ (Please initial here to indicate that you understand the above)
What is Social Engineering?
Social Engineering involves the use of deception to manipulate individuals into divulging confidential or
personal information that may be used for fraudulent purposes.
Social Engineering is viewed as a major threat to InfoSec at Gadsden State. To protect yourself, and
Gadsden State, from social engineering remember the following:
1. Stay aware and educate yourself. The most important step you can take is to keep yourself
educated about different types of social engineering threats. Participate in InfoSec-related
professional development and other InfoSec related presentations.
2. Determine if the person requesting information from you is authorized to have access to that
information. A common tactic is to put someone on the spot by creating a sense of urgency or
importance. Know that the ITS Helpdesk will never contact you to ask for any passwords. Also,