What is “Contract Cheating”?

Contract cheating refers to the practice where students outsource their assessments to third parties, such that the assignments or exams they submit are not their own work. The growth of online college degrees has created more opportunities for American students to outsource their schoolwork, resulting in a booming billion-dollar cheating industry centered in the East […]

Anatomy of a Phish: May 2024 Phishing Simulation

Test Inspiration: In early 2023, Cloudflare detected and blocked a phishing campaign leveraging the Microsoft brand in an attempt to harvest credentials through a legitimate — but compromised — site. Phishing Email Context: The phishing email designed for this test mimicked an official Microsoft password expiration notification. It used a personalization messaging such as the […]

IT System Security Updates This Friday

The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, March 29th. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]

Spring 2024 Employee Cybersecurity Awareness Training Is Live

GHC’s Spring 2024 Cybersecurity Awareness Training campaign is live on KnowBe4. All employees must visit https://training.knowbe4.com and complete the following training modules by April 30th: 2024 Common Threats 2024 Social Engineering Red Flags A small number of employees will also be required to complete a supplemental training module for phishing and email threats. This supplement will be assigned […]

IT System Security Updates This Friday

The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, February 23rd. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]

Anatomy of a Phish: February 2024 Phishing Simulation

Test Inspiration: RingCentral, similar to platforms like Teams or Slack, is a renowned communications tool. Its widespread use in the business sector makes it familiar to many professionals, and thus, an attractive target for cybercriminals. Attackers often craft emails with stylized HTML designs that resemble genuine RingCentral notifications. A common bait is to alert the […]

PII Refresher

Personally identifiable information, or PII, is a common term associated with data privacy regulations. While “PII” is specific to the United States (other countries call it personal data or simply personal information), the concept of what PII is and why it’s so important translates globally. Here’s what you need to know: PII includes many types […]

Why Policies Matter

If work-related security concepts were given a slogan, it would probably be “always follow policy.” In fact, you’ve probably encountered that statement many times, and for good reason. Policies are created to keep data, systems, and people safe. Without clearly defined policies, organizations would struggle to maintain security. They would also struggle to adhere to […]