Information Technology Services

Information Technology Services

A Message from our Chief Technology Officer

Information Technology Services (ITS), in collaboration with the college community, develops, implements, and maintains Sierra College's technology infrastructure. We provide coordination and leadership to advance technology across the enterprise, and guide policy creation and implementation.

Our mission in ITS is to re-engineer itself to responsively align with District initiatives centered on the student experience and increasing student success. 

Access Our Self-Service Solutions Center

We now offer Sierra College Solutions Center, a self-service site where you can request assistance and find answers to your questions.

What Can I Do in the Solutions Center?

Employees can access our Solutions Center to:

  • Submit a ticket to open a work order for ITS services, including audio-visual support, mySierra assistance, HelpDesk support and provide Solutions Center feedback and questions.
  • Review your ticket request history, status, and updates from technicians working on your request(s)
  • View Knowledge Base articles for self-help, how-tos, frequently asked questions, guides and more
  • Access services available through other departments in the Solutions Center, including Marketing and Facilities, which have their own work order forms.


How to Access the Solutions Center

Sierra Solutions Center logo On a District computer, click on the Sierra Solutions icon on your desktop, or

If a District computer does not have the icon or you are accessing the Solutions Center from home, go to the Sierra Solutions homepage. Sign on at the top right of the Solutions Center page with your Sierra College username and password to submit new requests and/or view your history.

Sierra College Cyber Security Information

Ransomware is a serious security matter that encrypts data and makes your computer data inaccessible. Please be vigilant in preventing ransomware from impacting our District systems. Typically these present themselves to you in the form of an email scam or malicious web site.

How to Prevent Ransomware

  • Do not respond to phishing emails or click on embedded links within those emails
  • Do not browse suspect sites and/or click on advertising links
  • If you believe you have been a victim of a computer virus, malware, or Ransomware attack on your work computer, immediately contact the ITS Service Desk at 916-660-7777.

Official information from Sierra College ITS will come from

Attention: Sierra College Staff

To assure your District data is properly backed up, always save it on a District network file share (N: drive, S: drive, or Department share). Note: Your computer’s C: drive is not regularly backed up by IIT.


Please protect yourself and our network users against email phishing scams. Phishing scams are more prevalent during the holiday season. Typically, they entice individuals to take action in one of the following ways:

  • Click on an embedded link that installs malicious software on your computer,
  • Get you to respond with personal information or financial support,
  • Sends you to a website where you provide personal information or financial support, or
  • Get you to spam others with ill-intended emails.

When you look at a message in your mailbox, take a moment and follow these helpful security tips:

  • Understand who it is from
    • Look at the "From" address. If it looks suspicious, DO NOT respond to it.
  • Review any embedded links in the message
    • Hover over the link to view the address. If the address appears suspicious, DO NOT click on the link.
  • Use caution and be suspicious when you notice:
    • Misspelled words
    • Bad grammar
    • A sense of urgency for your response
    • You won the lottery
    • It is an unexpected email

It is also important to ensure your computer has the current security patches and your antivirus software has the latest updates.

Always report suspicious emails to your supervisor and the ITS Service Desk at


Log in to the SANS Security Awareness Virtual Training Center to view training videos. Anyone with a California Community College email address can sign up for a free account.  

CYBRARY also provides free IT security training.

Google has patched a severe Android vulnerability that researchers at IBM said impacts more than 55 percent of devices. As with most Android vulnerabilities, users are reliant on handset makers and carriers to push patches downstream to devices, something they’ve not always been diligent about.

IBM characterizes the vulnerability as a serialization flaw that if exploited allows an attacker complete control over an Android device. The most serious of the vulnerabilities disclosed today at USENIX by researchers Or Peles and Roee Hay affect versions 4.3 to 5.1, Jelly Bean through Lollipop, as well as Android M Preview 1 currently in beta. Make sure you keep your Android devices updated!

Learn more by reading Patched Android Serialization Vulnerability Affects 55 Percent of Devices.

A handful of frantic Microsoft Windows users have asked how to recover from PC infections from “CryptoLocker,”  the generic name for an increasingly prevalent and nasty strain of malicious software that encrypts your files until you pay a ransom. For years, security experts have emphasized the importance of backing up one’s files as a hedge against disaster in the wake of a malware infestation. Unfortunately, if your backup drives are connected physically (USB for example), or via the local network to the PC that gets infected with CryptoLocker, your backups may also become  encrypted as well.

Computers infected with CryptoLocker may initially show no outward signs of infection; this is because it often takes many hours for the malware to encrypt all of the files on the victim’s PC and attached or networked drives. When that process is complete, however, the malware will display a pop-up message similar to the one pictured above, complete with a countdown timer that gives victims a short window of time in which to decide whether to pay the ransom or lose access to the files forever.  Windows users should check out CryptoPrevent, a tiny utility from John Nicholas Shaw, CEO and developer of Foolish IT, a computer consultancy based in Outer Banks, N.C.  Another option might be cloud data storage systems such as the new Microsoft Office One-Drive, since it is not connected and susceptible like a network shared drive or USB drive.

The mission of the Sierra College Cyber Security Workgroup is to establish and maintain an information security program for Sierra Community College.

The program core initiatives are to:

  • Assess our security posture annually through self-assessment using industry standard best practices such as ISO 270001 and NIST
  • End-User Awareness Program designed to educate students, faculty, and staff to proactively avoid security breaches.
  • Review and Update District Security Standards and Procedures
  • Implement and Practice Security Incident Response

Contact ITS Service Desk

Rocklin Campus A 200

Nevada County Campus N6 208

  • Phone: (530) 274-5300

  • Closed 1:30pm - 2:30pm M-TH