OTS - Cybersecurity

OTS Cybersecurity - Personal and Professional protection
OTS Cybersecurity - Protect against identity theft
OTS Cybersecurity - Are you exposing yourself
Share with care banner
Keep a clean machine banner

Welcome to the College of Southern Nevada’s resource for information technology security. It is important that everyone who uses a computer, laptop, tablet, mobile phone or any kind of smart device understands how to keep their information safe. OTS is committed to helping our faculty, staff and students protect their information and keep it as secure as possible.

Secure choices you can make:

Click Wisely: Beware of phishing emails and scams and only click on links you trust.  Forward suspicious emails to .

Protect Your Password: Use strong and unique passwords and implement two-step verification when possible.  Don’t share your password and use different passwords for work and non-work activities.

Protect Data: Make sure to protect PII data you may handle. Securely encrypt (Link to encrypt how to) or delete files with sensitive information.

Use CSN Email: CSN email should be used to conduct CSN business.  Don’t forward or save college sensitive emails to personal devices or email accounts.

Use Supported Tools: Don’t use unsupported or unapproved software or hardware without consulting OTS.  Downloading software to CSN devices or attaching voice enabled devices or hardware to the CSN network can compromise data at the college. 

Physical Security: Never leave laptops and mobile devices unsecure and unattended.  Secure your area and lock computer screens before leaving them unattended-even if for a few seconds!  Password protect all of your devices using strong authentication when possible.


Password security

How Strong is your Password?

Cybersecurity - Cyber Safety for Students

Cyber Safety Tips

Cybersecurity Newsletter

Cybersecurity: OUCH! Newsletter

Stop, think, connect campaign logo

Cybersecurity: Stop | Think | Connect

Cybersecurity: Make It a Habit!
Good habits are the foundation of cybersecurity just like they are for safety and security in the physical world -- like locking your front door or wearing your seat belt in the car.

Here are eight important cybersecurity habits to incorporate into your online life. Try to make these habits automatic. They will help protect your information, your family and your work. They'll also reduce your risk of getting scammed!

1. Always think twice before clicking on links or opening attachments.

  • Even if they look like they're from someone you know.
  • Whenever possible, go to web pages by a path you know is legitimate instead of clicking on a link in a message.
  • If an attachment is unexpected, contact the sender by a method you know is legitimate to confirm they sent it.

2. Verify requests for private information (yours or anyone’s), even if the request seems to come from someone you know.

  • Con artists know how to fake their identity.
  • Check your financial statements and credit reports regularly.

3. Protect your passwords.

  • Make them long and strong.
  • Never reveal your password to anyone.
  • Use different passwords for different accounts.
  • Use different passwords for work and non-work activities.
  • Click “no” when websites or apps ask to remember your password.
  • Use strong authentication where possible, such as multi-factor authentication (MFA), fingerprints, and tokens.

4. Protect your stuff! Lock it up or take it with you before you leave.

  • Secure your area and lock your computer screen before leaving them unattended – even just for a second.
  • Take your phone and other portable items with you or lock them up.
  • Password protect all of your devices. Use strong authentication where possible.

5. Keep a clean machine! Keep your devices, apps, browsers, and anti-virus/anti-malware software patched and up to date*.

  • Automate software updates.
  • Restart your devices periodically.
  • *Find out what you need to do, if anything, for devices managed for you.

6. Back up critical files.

  • Store backups in a physically separate location from the originals.
  • For critical work files, use storage options that are approved by your UC location and are backed up regularly
  • For personal files, save a backup copy of anything critical on a separate hard drive, data stick, CD/DVD, etc., and store it securely.
  • Test your backups periodically.

7. Delete sensitive information when you are done with it.

8. If it’s suspicious, report it!

  • Report suspected scams and other suspicious activity to your supervisor, and follow your location's reporting protocol.
Courtesy of the University of California
Icons for Habits #1, 2, 4-7 by VisualPharm, licensed under Creative Commons BY (version unknown). Endorsement not implied.


How do I send an encrypted email?

Whenever you need to send an email to a recipient outside of CSN, it is very important that it be encrypted, especially if it contains Personally Identifiable Information (PII) of students, staff, or faculty. PII is defined by the US Government as:

Information which can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc.

Send An Encrypted Email Graphic

I’ve Received Spam or a Suspicious Email. What Should I Do?

If you have received spam or a suspicious email, follow the steps below: 

  1. Do not click any links within the email.
  2. Forward the message to so the OTS team can investigate the email.
  3. Delete the email.

If you have clicked any links within the email or opened any suspicious attachments, contact the OTS Help Desk.