The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, January 31st. Systems that cannot be safely updated through this automated process will be updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]
Author Archives: ifleming@highlands.edu
Microsoft 365 – Automatic Student Group Expiration Settings
Microsoft Groups allows users to create their own groups in order to collaborate with a shared mailbox and calendar, a SharePoint site, a Microsoft Planner, and/or Microsoft Teams. However, GHC has no established process to review and remove student-created groups once students graduate, transfer, or otherwise leave GHC. Therefore, we have updated our settings for […]
Information System Updates This Friday
The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, October 25th. Systems that cannot be safely updated through this automated process will be updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]
🚨 Beware of QR Code Phishing Scams! 🚨
As technology evolves, so do the tactics of cybercriminals. One of the latest threats to be aware of is QR code phishing. These seemingly harmless codes can lead to serious security breaches if you’re not careful. Here’s what you need to know to stay safe: What is QR Code Phishing? QR code phishing involves scammers […]
An Unsettling New Trend with Sextortion Scams
Sextortion scams are years-old form of phishing where scammers threaten to release intimate or compromising images or videos of the victim unless a ransom is paid. These scams often begin with an email or message claiming that the scammer has hacked the victim’s device and recorded them through their webcam. To make the threat more […]
What are Ghost Students?
A ghost student is created when a fraudster completes an online application to a college or university and then, once accepted, enrolls in classes. At that point, the fraudster behind the ghost student can use the fake identity to act like a regular student. He or she can access and abuse cloud storage provided by the […]
How to Create a Hacker-Proof Password
Generate a passphrase that contains three or more randomly chosen words. Use a website like Keeper’s Passphrase Generator or make it a game! Use your passphrase to set up a reputable password manager app like LastPass, BitWarden, Keeper, and 1Password Let your password manager generate (and manage) strong passwords for all your online accounts.
IT Policy Updates Posted on GHC Policy Manual
The following policy revisions were approved by President’s Cabinet and posted on the GHC Policy Manual: IT Acceptable Use policy IT Acceptable Use standard IT BYOD policy IT BYOD standard IT Encryption policy While the Acceptable Use and BYOD only received minor grammatical updates and clarifications, the Encryption policy has been completely rewritten to […]
What is “Contract Cheating”?
Contract cheating refers to the practice where students outsource their assessments to third parties, such that the assignments or exams they submit are not their own work. The growth of online college degrees has created more opportunities for American students to outsource their schoolwork, resulting in a booming billion-dollar cheating industry centered in the East […]
IT System Security Updates This Friday
The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, March 29th. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]