Information Security – Information Technology /technology Sun, 07 Dec 2025 23:41:14 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 ProofPoint /technology/services/proofpoint/ Wed, 01 Oct 2025 17:55:58 +0000 /technology/?post_type=pcc-services&p=4639 Proofpoint offers email security tools to help organizations protect against advanced cybersecurity threats.ÌýProofpoint offers solutions to protect people from threats, safeguard information, and provide security awareness training. PCC currently utilizes the following features to protect our users:

]]>
Proofpoint – Email Digest /technology/services/proofpoint-email-digest/ Tue, 30 Sep 2025 19:15:21 +0000 /technology/?post_type=pcc-services&p=4634 The email digest provides you with a list of messages that have been sent to quarantine because they triggered filtering rules. The email summary from noreply@pcc.edu is sent daily at 7 am. These quarantined messages are held for 30 days. In this period, you could review and release them. After 30 days, the messages will be automatically deleted from the system.ÌýNote: An email digest is not sent if there are no quarantine emails or no new quarantine emails after a digest is sent.

What messages get quarantined?

Low Priority Mail – Quarantined
Spam – Quarantined
The action you take on these messages determines how future messages from the senders will be handled.

What does the email digest look like?

Screenshot of email digest. Notes the various features

To view the contents of a quarantined message, click the subjectÌý´Ú¾±±ð±ô»å.

Links contained in the email digest:
  • Request New End-User Digest: Allows you to request a new digest to see whether messages have been sent to the quarantine since the last digest was received.
  • Request Safe/Blocked Senders List: If you have populated your safe or block lists, a copy of those lists is sent.
  • Manage My Account: Takes you directly to the end-user Web Application. You can manage the messages and list from a web interface.
  • Release: Releases the message from quarantine and allows it to be delivered to your inbox. Note: If you have filters configured, the email may be routed to a different folder/label.
  • Release and allow sender: Releases the message from quarantine, and the sender is added to your personal list of safe senders.
  • Block Sender: Delete and block future messages from the sender.
How do I manage my account?

The Manage My Account interface allows you to take action on the emails from a web-based interface. The results would be the same as if you took action from the email:

Screenshot of the Manage My Account screen

]]>
Proofpoint – Email Warning Tags /technology/services/proofpoint-email-warning-tags/ Tue, 30 Sep 2025 19:05:21 +0000 /technology/?post_type=pcc-services&p=4627 The “Email Warning Tags” feature adds an informative header to incoming emails, visually warning recipients that a message may be more dangerous than typical internal communications. These visual cues encourage caution and verification before interacting with the content.

Appearance

Example:

This tag informs the recipient that the message was sent from outside PCC. We are using Google’s external tag for this feature.

Other Examples:
Unknown Sender

This tag informs the recipient that the message was sent from a sender with whom the recipient has not previously corresponded.

FAQs
Why are the Email Warning Tags in place?

These warnings are added to emails coming from outside of Ë¿¹ÏÊÓÆµ and have become a security best practice and are in place at many organizations.  We continue to have Ë¿¹ÏÊÓÆµ users be the victims of phishing and other scams from outside entities, which provides a warning to look carefully before clicking or responding.

Email is one of the most common methods for infiltrating an organization’s cyber infrastructure. These tags serve as visual cues to prompt caution and verification before interacting with content received from external services.

Is it possible to exclude my personal contacts from the Email Warning Tags?

No, the Email Warning Tags are global and cannot be individually managed.

Is it possible to exclude a Ë¿¹ÏÊÓÆµ partner from the Email Warning Tags?

Yes, for approved vendors, it is possible to exclude their messages from the Email Warning Tags except for the External Sender tag. Please submit a ticket by clicking on “IT Service Desk“. Please include the full email address and an example email message in the request.

What happens when I reply-to or forward a message that has an Email Warning Tag?

The Email Warning Tag will be removed from your message when you reply to or forward a tagged message to an external recipient.
Note: The Email Warning Tag is removed when a message reply or forward is sent to an external email address. If the message is forwarded to another internal email address, such as another PCC user, the tag is not removed.

Here is an example:
This is a message sent from an email address outside of Ë¿¹ÏÊÓÆµ to a staff account. It was tagged, as expected.

When the recipient replies to the original message, the recipient of that reply will not see the email warning tag.

What if a tagged message was not expected?

If you receive an email that you suspect may be a phishing message, please refer to  to report the suspected phishing.

]]>
Proofpoint – ZenGuide /technology/services/proofpoint-zenguide/ Mon, 29 Sep 2025 18:43:03 +0000 /technology/?post_type=pcc-services&p=4521 ZenGuide is a mail add-in that allows you to easily report a potential phishing email. With the click of the Report Phish button, a notification is sent to Proofpoint Email Security & Information Security Team for analysis.

How to Report Phish using ZenGuide for Google Mail

°Õ³ó±ðÌýZenGuide Report Phish Google Mail Add-in allows for the reporting of potential phishing email messages with the click of a button.Ìý Follow the directions below on how to report suspicious messages using the ZenGuide Report Phish button.

  1. Open the suspected phishing message
  2. Click the ZenGuide button located on the right-side panel of the Google Mail Interface.ÌýNote: the right-side panel is hidden by default in some web browsers. If so, there will be a small arrow button visible on the bottom right side of the webpage when scrolling. Click this button to show the panel.
  3. You will receive a confirmation message. Click Report Phish
    example of ZenGuide window in Gmail. Red arrows point to the icon in the right-hand toolbar and the Report Phish button.
  4. After the message has been reported, you will see a ZenGuide verification message thanking you for your report
]]>
Trellix /technology/services/trellix/ Mon, 10 Oct 2022 20:58:10 +0000 /technology/?post_type=pcc-services&p=3346 Trellix (Previously FireEye) is a company that Ë¿¹ÏÊÓÆµ and a consortium of Oregon community colleges have partnered with to assist in the area of Information Security.

Benefits:

  • Protects our computers, servers, and networks against a wide range of threats across various attack surfaces.

Products PCC uses

Trellix Endpoint Security

Trellix Endpoint Security is PCC’s endpoint anti-malware, anti-virus protection, and intrusion prevention technologies to stop and remove malicious software. This software runs quietly in the background, ensuring that your computer is secure.

Trellix – Exploit Guard and Process Guard
Exploit Guard

Exploit Guard Protection protects your endpoints from previously unrecognized exploits and other online attacks. This agent feature has two components: Exploit Guard detection and Exploit Guard prevention that allows it to detect and prevent exploit behaviors on your host endpoints that occur during the use of: Adobe Reader, Adobe Flash, Internet Explorer, Firefox, Google Chrome, Java, Microsoft Outlook, Microsoft Word, Microsoft Excel, and Microsoft PowerPoint.

Exploit Guard Protection is supported for host endpoints running in specific Windows environments only. Exploit Guard Protection is not supported for host endpoints running macOS or Linux operating systems.

If your Windows computer displays the below pop-up notification and you are prevented from being able to access one of the above applications, please reach out to the IT Service Desk at 971-722-4400 or servicedesk@pcc.edu.

Pop-up:

Process Guard

Process Guard protects endpoints against credential theft attacks by preventing access to credential data stored in the Windows Local Security Authority Subsystem Service (LSASS) process.

]]>
IT Exception Request /technology/services/exception-request/ Wed, 02 Mar 2022 18:02:40 +0000 /technology/?post_type=pcc-services&p=3032 Exceptions to PCC Information Technology (IT) standards are meant to assist areas where a temporary solution is needed, and allow time for the requester to comply with IT policy and standards. All exception requests are reviewed and approved by the Information Security Manager and the AVP.

As we restrict workstation administrative privileges as part of the Active Directory (AD) rollout, we recognize that there will be instances where some users will require elevated privileges to ensure normal operations and academic continuity.

Because exception requests are reviewed on a case-by-case basis, it is important to provide as much information as possible (using the form below) to support your request. Once a request is approved, notification will be sent to the requester and the supervisor indicated on the request.

*** Requests take up to 10 days to process. ***

]]>
Information Security /technology/services/information-security/ Sat, 17 Aug 2019 01:08:26 +0000 /technology/?post_type=pcc-services&p=2288 In order to protect the institution and its private information and data and to comply with federal law, state law, and fiduciary responsibility, PCC developed an Information Security program for critical operational, private, and financial information and financial information in accordance with the Gramm-Leach-Bliley Act and other programs.

Read more about our Information Security Programs

]]>
Password Manager Pro /technology/services/password-manager-pro/ Tue, 28 Aug 2018 21:15:45 +0000 http://wordpress.pcc.localhost/technology/services/password-manager-pro/ Password Manager Pro is a secure vault for PCC employees to store and manage shared sensitive information such as passwords, documents and digital identities of enterprises.

]]>
Virtru Email Encryption /technology/services/virtru-email-encryption/ Tue, 28 Aug 2018 21:15:45 +0000 http://wordpress.pcc.localhost/technology/services/virtru-email-encryption/ Virtru has been procured at PCC for staff to use to send sensitive information by email, such as

  • personally identifying information (pii)
  • data protected by FERPA laws
  • HIPAA data

Virtru is integrated into the Google Mail inbox.

]]>