News – Information Technology /technology Wed, 08 Apr 2026 20:32:45 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 Qtr 3 FY26 Quarterly IT Portfolio /technology/2026/04/08/qtr-3-fy26-quarterly-it-portfolio/ Wed, 08 Apr 2026 20:30:30 +0000 /technology/?p=4754 Our IT Portfolio Management Office has published the FY26 Qtr 3 Quarterly Portfolio Report.

The PCC IT Department continues to deliver high-impact technology projects focused on supporting teaching, learning, and the college’s core IT functions. By prioritizing operational efficiency and innovation, we consistently meet client expectations and promote equitable student success across the district. The following results offer a comprehensive overview of our quarterly portfolio, detailing successfully completed initiatives alongside status updates for active projects in progress. Read additional details about completed projects in our (Monday.com login required).

For a downloadable .pdf version of this report, please utilize the following link: FY26 QTR3 IT Portfolio Analysis Report Dashboard (January–March 2026

For any questions regarding the IT portfolio please contact itpmo@pcc.edu, or visit the .

]]>
Qtr 3 FY26 Quarterly IT Client Services /technology/2026/04/06/it-client-services-quarterly-scorecard-jan-mar-2026/ Mon, 06 Apr 2026 21:26:42 +0000 /technology/?p=4752 The IT Client Services division has created the quarterly (Jan – Mar 2026) scorecard. You can view at quarterly or annual level. This scorecard details Service Desk metrics, software updates, Splashtop usage, and provides insights into IT divisional activities. Annual and past quarter statistics are also available via the top-left drop-down menu on the CS Scorecard Metrics page.

Q3 January – March 2026

Annual (July 2025 – June 2026)

]]>
AI Phishing /technology/2024/03/15/ai-phishing/ Fri, 15 Mar 2024 22:08:58 +0000 /technology/?p=4123 Every day scammers send billions of spam messages. Now these scammers have new tools that will make it even harder to catch them.

You may have heard the term “deepfake”. A deepfake is what is produced when someone uses AI to impersonate another person. This can be done via text, audio, or even video.

It doesn’t take much information to create a deepfake of a person. Most individuals who have a social media account post enough information publicly that such a deepfake could be created of them.

Scammers are using these deepfakes for many harmful purposes. Of course, they are also using them to send more and more real seaming messages for phishing purposes.

In one case, someone used a deepfake of a person’s daughter over a phone call in an attempt to trick the individual into paying a ransom.

So, what can we do?

The good news, using AI generated content for phone calls is now illegal in the US. However, that hasn’t stopped robo-calls or illegal scam operations in general. It also doesn’t address email or video.

It is important now, more than ever, to validate the sources of messages. Check-in with people and make sure the message comes from them. If something looks off (or a bit phishy!) it might not actually be from your coworker or your boss. Double check with them if you are concerned.

Staying vigilant about these changing threats will help keep you safe, the students we serve safe, and protect our whole community

]]>
ChatGPT and Information Security /technology/2023/04/05/chatgpt-and-information-security/ Wed, 05 Apr 2023 23:32:39 +0000 /technology/?p=3710 ChatGPT is one of the newest Artificial Intelligence (AI) technologies that is quickly gaining in popularity. It offers the ability for a chat bot to conversationally respond with very realistic writing that can be used to compose email or even technical information such as code. At its core, these systems are simply web forms that accept input, process that input, and then produce output.

First, a malicious person could put input into one of these systems in order to automatically generate spam and phishing emails that are very convincing. This makes them much harder to identify and track. Staying alert to potential threats in emails and messages is more vital than ever.

Then, there is a question of how the data entered will be used. When you enter information into a form online you are sharing that information with a third party. That third party can then share that information with other parties. This is why confidential information should never be entered as input into these AI chat bots unless appropriate approval and authorization is in place. PCC policy and legal regulations prohibit PCC related controlled sensitive information from being shared with third parties without authorization, and that includes the companies behind these AI services.

Finally, the output of these AI services should not be treated as meeting the goals and standards of quality and service that PCC maintains through our values and policies. The values of the college are not necessarily the same as those programmed and trained into these AI bots. So, the output could be offensive, misleading, incorrect, or otherwise not aligned with PCC’s mission.

Popularity of this new “AI” industry is growing rapidly and has already seen adoption from companies such as Microsoft in their Bing search engine. ҴǴDzԻSlack have stated they are also working on implementations. As this technology is adopted, PCC will be evaluating it to ensure policy, regulations, and the college’s mission are fulfilled by the use of such technology. Until that process is conducted, we recommend not using these chat AI services for any PCC related work.

]]>
Phishing /technology/2022/08/26/phishing/ Fri, 26 Aug 2022 20:04:17 +0000 /technology/?p=3268 We have all experienced receiving an unwanted email from a malicious actor, attempting to scam or otherwise trick us into providing personal information. These types of attacks are called Phishing Attacks. Attackers, ranging from individuals to well organized groups, will send out mass malicious emails to try and “fish” for targets to infect with malware, or trick into providing sensitive information. These messages often appear to come from legitimate entities, organizations you have worked with in the past, and even those we work with who hold positions of authority.

Sometimes, these attackers will target specific individuals who are known to have privileged access or highly sensitive information with extremely convincing, complex, and customized scams. These highly-targeted phishing attempts are called Spear Phishing Attacks.

PCC’s Information Security team takes a number of precautions to prevent these types of attacks from reaching your inbox, but technological controls alone are not enough. Having a well informed community who are able to recognize scammers and other malicious parties is the most important preventative measure to stop these attackers in their tracks.

Here are some tips to help protect yourself and the PCC community from phishing attacks:

  • Verify the identity of the sender. This is especially important when an email arrives unsolicited, or if the sender appears to be an individual in a position of authority.
  • Before clicking a link (including Google Drive share links) or downloading a file, check for red flags such as the website address matching what is expected. You can always contact the other party yourself by using Google or calling them at a known number instead of clicking a potentially risky link.
  • Never provide your password or other sensitive data to an unsolicited email.
  • .

If you receive a suspicious email, you can use the to mark the message as “Spam” or “Phishing”. Marking an email as phishing within Gmail will immediately create a Service Desk ticket that is routed to our Information Security team. Messages marked as spam also alert our Google Administrator and Information Security team.

Finally, it is worth noting that these malicious parties can be creative with their attacks. Even the most savvy person can be taken advantage of. If phishing didn’t work, then malicious actors wouldn’t use this type of attack. The most important thing is to work immediately with Information Security to stop the attacker before more harm to PCC and you can occur. If you believe that you have been involved in a phishing attack, immediately reach out to the Service Desk.

Phishing attacks are extremely common. According to , 90% of cyber attacks in 2019 were caused by phishing. Keeping an eye out for malicious actors and working together to keep them from attacking PCC helps create a safe and welcoming environment for all.

]]>
Personal Devices Vs. PCC-Managed Devices /technology/2022/06/28/personal-devices-vs-pcc-managed-devices/ Tue, 28 Jun 2022 19:49:39 +0000 /technology/?p=3209 When setting up and maintaining a home office, how do PCC Employees get the resources needed to serve the community and help students succeed? The answer to this question has brought out the creativity of so many of us as we rise to the challenge. As PCC continues to innovate and uplift so many, we must account for the safety and well-being of our coworkers, faculty, and students. For this reason, Information Security wants to share that the use of personal devices poses a very large risk, if compromised it would jeopardize our mission and values.

At PCC, we have whole teams of professionals working to ensure that you get access to systems that are tested, updated, and secured. This way students’ private information, financial information, and other operational information is kept secure. We call this information Controlled Sensitive Data. This data includes all non-public information that PCC is obligated to protect by following regulatory standards and policy. It is everyone’s obligation to help keep Controlled Sensitive Data secure.

Using a personal device to handle Controlled Sensitive Data puts our community at risk. Personal devices, such as personally-owned laptops, tablets, cell phones, and other electronic devices do not have the protections that the IT department has carefully considered and put in place. These considerations are made to comply with legal regulations, and PCC policy, and to protect you and those whose information you’ve been trusted with.

Unauthorized use of personal devices to receive, send, or work on Controlled Sensitive Data may have legal repercussions for PCC as well as you individually. For these reasons and more, PCC’s Acceptable Use Policy (AUP) states:

Faculty and staff shall not perform PCC business on non-authorized personal devices. (PCC AUP, June 2022)

In order to succeed in the college’s mission, we must work together to create a culture that ensures students are protected from cyber threats. If you have any questions or concerns regarding this information or other issues that you would like to discuss with the Information Security team, feel free to reach us at infosec@pcc.edu.

]]>
Banner Fiscal Year End Processing /technology/2019/06/19/banner-fiscal-year-end-processing/ Wed, 19 Jun 2019 16:16:04 +0000 /technology/?p=2207 In order to complete critical year-end processing and reconciliation, Banner and associated systems and services (Self Service, BanWeb, PCC Pay) will be unavailable from 10pm on Sunday, June 30 until no later than 2am on Monday, July 1. Banner will available earlier if processing finishes ahead of schedule.

During this down time:

  • Students will not be able to make payments, register for classes, or set up payment plans
  • Banner reports and jobs may be delayed
  • No reports or jobs will be lost
  • Banner login will be disabled

Please contact IT Service Desk at 971.722.4400 or by email to servicedesk@pcc.edu if you have questions about this announcement or any other technology topic.

]]>
1300 systems upgraded as part of Windows 10 migration /technology/2019/05/31/1300-systems-upgraded-as-part-of-windows-10-migration/ Fri, 31 May 2019 17:55:31 +0000 /technology/?p=2195 two people shaking handsThe PCC IT team just wrapped up a major project to upgrade all employee Windows computers to version 10.  Microsoft is moving away from supporting Windows 7 by January 2020, so this work has been a top priority. This initiative involved working with college departments across the district to coordinate upgrades after business hours to minimize disruption of classes and department operations. Over the course of four months, we upgraded more than 1300 computers.

A BIG CONGRATULATIONS for this accomplishment goes out to staff in the campus teams and Service Desk.

To faculty and staff: You have our gratitude for your patience and collaboration throughout this major project!

]]>
CIO brief: upgrades to Windows, ImageNow, and backup & recovery system /technology/2019/02/14/cio-brief-upgrades-to-windows-imagenow-and-backup-recovery-system/ Thu, 14 Feb 2019 17:42:52 +0000 /technology/?p=2024 The Client Services team has begun upgrading all district-wide Windows computers to Windows 10 (Microsoft ends support of earlier versions in 2020). The Infrastructure Services team, in partnership with the Office of Planning and Construction, has selected the Dell EMC IDPA 5800 to replace our end-of-life data backup and recovery system. Last weekend, the Application Services team upgraded our imaged document management system, ImageNow, to the latest supported version. The Information Security team has completed the 2018 Information Security Report and the 2018 Penetration Test Report (all findings resolved).

]]>
CIO brief: strong encryption protects employees and students /technology/2019/01/17/cio-brief-strong-encryption-protects-employees-and-students/ Thu, 17 Jan 2019 23:26:24 +0000 /technology/?p=2022 We have identified and resolved a significant vulnerability relating to system credentials (login and password). This had particular impact on student credentials. Through strong collaboration between Student Services and IT’s enterprise applications and service desk teams, over the last few months we have implemented the latest strong encryption protocol on hundreds of thousands of records in our core identity management system. This involved complex technology changes as well as coordinated outreach to students. This is an important step forward in protecting PCC from cyber attacks and students from identity theft.

]]>