• Skip to primary navigation
  • Skip to main content

Texas A&M System IT

The Texas A&M University System

  • Services
    • AggieBuy
    • Concur
    • Contracts
    • Earning Codes
    • Enterprise Data Warehouse
    • FAMIS
    • Maestro
    • Position Budget
    • Security Operations Center
    • Single Sign-On
    • Time and Effort
    • TrainTraq
    • TRS
    • UIN Manager
    • Workday Services
  • Collaboration
    • Project Management
    • Organizational Change Management
    • The Texas A&M University System Technology Summit
  • Projects
    • HCM Academic Management Discovery
    • Financial Systems Modernization
  • Cybersecurity
    • News and Alerts
    • Be Cyber Savvy
    • Standards and Procedures
    • Report an Incident
    • Security Operations Center
    • Information Security Council
  • Governance & TACs
    • IT Governance Framework
    • Accessibility
    • Project Management
  • Contact
  • About
    • Members
    • CIO Blog
    • Communications
      • Guidelines
      • Logos, Color Palette and Templates
      • Writing Style
      • Web Requirements
      • Email and Email Signature
      • Statewide Cybersecurity Services Style Guide
  • Search

Cybersecurity

Cybersecurity at the A&M System is an individual and collective effort of our members. It is necessary for us to work together, sharing resources and information assets.

You are here: Home / Cybersecurity / Cyber Safety Tips for Working Remotely

Cyber Safety Tips for Working Remotely

white house on green backgroundThink Before You Click.

Cyber criminals are taking advantage of people looking for information on COVID-19. They are distributing malware campaigns that impersonate organizations like the World Health Organization, the Centers for Disease Control and Prevention and other reputable sources by asking you to click on links or download outbreak maps. Don’t click – go directly to a reputable website to access content.
 

Lock Down Your Login.

Create long and unique passwords for all accounts and use two-factor authentication (2FA), such as Duo, wherever possible.

Connect to a secure network

Connect to a secure network to access your work accounts. Update your home router to the most current software and secure it with a lengthy, unique password. Use a VPN and limit use of public WiFi as directed by your IT organization.

Limit non-employee access to the device you use for work.

You are the only person who is approved to use your work computer. Family and friends should not use your work-issued device.

Use member-approved devices and applications

Use member-approved devices and applications to collaborate and complete your tasks.

Update your software.

Before connecting to your work network, be sure that all internet-connected devices ‒including PCs, smartphones and tablets ‒ are running the most current versions of software. Always accept critical and security updates when they are offered to you.

Copyright © 2022 Texas A&M University System All rights reserved.

301 Tarrow Street, College Station, TX 77840 | MAP | Phone: (979) 458-7700 | email: tamus-webmaster@tamus.edu
State of Texas |  Texas Homeland Security |  Texas Veterans Portal |  Statewide Search |  Risk, Fraud & Misconduct Hotline |  Privacy |  Web Accessibility |  State Link Policy |  Campus Carry

Texas A&M University System
Security Operations Center Governance Board

Purpose

Provides cybersecurity services to enhance the IT security position of A&M System members

 

Responsibilities

Provide financial oversight, guiding principles and strategic direction for the A&M System shared service implementation of the Security Operations Center

 

Members

Chair: SOC Board Member (rotates)
Vice Chair: SOC Board Member (rotates)
Secretary: SOC Board Member (rotates)

11 Representatives nominated and elected by the Information Security Council, consisting of:
– Two University Chief Information Officers
– One Agency Chief Information Officer
– Two University Information Security Officers
– One Agency Information Security Officer
– Five Member Cybersecurity Functional Professionals (IT Manager, Network / Security / System Administrator, Analyst, Engineer, etc.)

 

 

Upcoming Meetings

2021

  • November 4

2022

  • February 28