Recommended Best Practices

Please note: IT is unable to provide direct support on personal devices', networks, or printers.

Workstation
Basics

  • Cleaning and Maintenance

    Regular cleaning of your computer is just as beneficial to the device as it is for the hygiene of your workplace. A clean computer will run faster and cooler than an unclean system, as a build up of debris and dust can clog the internal components of the device. This will reduce the performance of the computer as well as cause over-heating and possible failure of the internal hardware.

    To save your device from dirty screens and cameras, stuck or sticky keyboards, and overall dust - please visit our Device Physical Care webpage.

  • Webcam Covers

    If you would like a cover for your laptop or all-in-one webcam when it is not in use, please use the following approved webcam cover.

    Do not use tape, post its, or any other adhesive products directly on the webcam lens - as this can cause permanent damage to the device.

  • Internet Connectivity
    Wireless:

    If you are having trouble with your wireless connection try the following:

    • Move your device closer to your wireless access point (router/modem).
    • Turn off other devices that are connected to the wireless network but are not needed for your work
    • Check with your Internet Service Provider for information on WIFI signal boosters or for assistance in strengthening your wireless signal.
    Test Your Connection

    If you are still encountering difficulties loading online applications, connecting to Zoom, or poor quality in calls or video meetings, please perform the following speedtest and include the results if you open an IT support ticket.

  • Secondary Monitor

    If your current device has a screen that is too small for your regular work, or you require an additional monitor for improved workflow,  Secondary Monitors can be requested from IT .

    • Please detail your specific work needs and current setup that will benefit from a secondary monitor.

    For connecting a secondary monitor:

Security
Basics

  • Phishing
    • If you encounter any suspicious e-mails or attempts to extract personal or district protected information or accounts, select the email and click on the Phishing Alert Button in Microsoft Outlook for further investigation by the IT Department.
    • Do not respond to the sender or click on any links provided in the suspicious e-mail.
  • Anti Virus & Malware

    Palo Alto's Cortex XDR is an Enterprise level district provided Anti-Malware, Anti-Virus Security program that runs automatically in the background on your district provided device.

    • You do not need to manually run any security checks or updates for Cortex XDR.
    • Please do not purchase or install other non-district provided Anti-Malware or Anti-Virus programs on district devices.
    • Visit how to run a manual scan if you believe your device has been compromised or you have downloaded a suspicious file or program.
  • Strengthen Your Password

    If you believe your device or account has been compromised, please create an IT Support Ticket.

    Do's
    • We recommend using passwords over 8 characters in length.
    • Include Special Characters and numbers frequently in the password.
    • Remember: The more complex a password is, the less likely it is to be compromised by outside sources.
      • You can replace regular letters with special characters or numbers to increase the security of your password:
      • A stronger password will be made from a combination of multiple words

     

    Basic Stronger Strongest
    Brightday1! Br1ghtDay! Br1ght!D4y$
    Positive4@ iAmP0sitive! I4mPos!tiV3%
    Gratitude2# Showgr4titude# 5hoWGr4t!tude$

    Note: Apple Keychain, district computers, and district provided software (e.g. Office and Adobe products) are safe to save your login credentials on.

    Do not's
    • Do not use 123, 111, or any other repeating format.
    • Do not use your name or the names of close family, friends, employment information or other personal identifying information.
      • This information is publicly available and is frequently used by 'hackers' to access secure accounts.
    • We do not recommend saving your login credentials on your web browser.
  • Managing Mac Keychain
  • Data Management
    • Empty your downloads and trash folder weekly.
      • Evaluate your files/folders for content that is unused or is no longer needed.
    • Save your important files and folders online through platforms such as Office365's OneDrive or SharePoint.
    • Employees and Faculty can save their content on their personal X:Drive though SRJC network connected devices.
      • X:Drives are regularly backed up on our servers and are accessible through any on-campus device or remotely through VMWare Horizon.