Personal Cybersecurity – Understanding HIPAA

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) governs the exchange of electronic health care information between organizations such as healthcare providers and health insurance companies. This law is frequently misunderstood by the general public and well-meaning advice or privacy concerns, particularly in light of the COVID-19 pandemic, often evolve into outright misinformation […]

Mandatory Cybersecurity Awareness Training in D2L – Spring 2021

GHC’s “2021 Spring USG Cybersecurity Awareness” training module is now available in D2L. Employee participation is mandatory and GHC will be required to finalize this training in order to compliance to USG Cybersecurity by April 30th, 2021. All employees who have not completed this module by April 30th will have their Single Sign-On accounts suspended. […]

Important Change to Network Shares (“H-Drive”)

The Division of Information Technology is preparing to discontinue the use of employee “H-Drive” accounts. These legacy file shares were provisioned with employee accounts prior to 2018 and provided those individuals with a network location to back up important documents from their GHC-issued devices. Due to the availability of Microsoft OneDrive and the low usage […]

Coming Soon: Spring Cybersecurity Training

GHC is preparing to launch our Spring 2021 Cybersecurity training module for employees using Brightspace by D2L. Please set aside 15-20 minutes to complete this module once it’s made available next week. As a reminder, all GHC employees must complete this course by April 30. This required training takes place twice a year in April […]

Tax Scams and Phishing

With apologies to Benjamin Franklin, nothing in this world can be said to be certain except death, taxes, and tax scams. As we enter the US tax preparation season, scams targeting taxpayers are in full swing. Here are some tips you can follow during tax season to keep scams from taxing you (See what I did […]

Online Privacy Tips

The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide Personally Identifiable Information (PII) such as your name, date of birth, account numbers, passwords, and location information. #BeCyberSmart when sharing personal […]

Phishing

Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their computers, creating vulnerability to attacks. Phishing emails may appear to come from a real financial […]