The following IT policies have been updated: IT Email Policy (IT.PO.180) – The purpose of this policy is to define the security, privacy, and oversight expectations for official GHC email systems. This update clearly describes the security limitations of email, GHC’s responsibility to balance email privacy with our responsibility to protect state resources and comply […]
Category Archives: Information Security
Cybersecurity Basics: Social Engineering
Social engineering begins with research, whereby an attacker reaches out to a target to gain information and resources. When someone you don’t know contacts you and asks you open-ended questions, this may be the first step of a social-engineering attack. After the attacker reaches out to you, they will then attempt to establish trust with […]
New Office 365 Feature – Daily Briefings from Cortana
Microsoft has enabled a new feature in our Office 365 environment called Daily Briefings. These daily email messages are designed to help you remember meetings, to-do items, reply to correspondences. According to Microsoft: Briefing emails are personal and private and are only sent to you directly in your mailbox, which cannot be accessed by anybody […]
Cybersecurity @ Home Presentation from Fall In-Service
In case you missed this presentation or want to review it for information about how to protect yourself online, IT’s Cybersecurity @ Home presentation is available on our website: https://sites.highlands.edu/information-technology/information-technology-services/security-training-resources/ This webpage contains numerous other cybersecurity resources and references, including guides from the Electronic Frontier Foundation, NOVA Labs, and the Department of Homeland Security.
Email Basics at GHC
Email Usage When using your GHC email account, always: Ensure that email messages and replies are addressed to the appropriate recipient(s). Do not use “reply all” to respond to a message unless it is necessary to do so. Compose each message with a clear, concise subject line that matches the message body. Follow professional etiquette […]
Duo Is Coming Soon for Students!
Securing information and information systems is an important responsibility of the University System of Georgia (USG) and all USG institutions. In order to ensure that we are doing our part to keep our students safe online, GHC will require the use of Duo Security for all student Single Sign-On accounts beginning on August 1st, 2020. […]
Email Basics at GHC
Email Usage When using your GHC email account, always: Ensure that email messages and replies are addressed to the appropriate recipient(s). Do not use “reply all” to respond to a message unless it is necessary to do so. Compose each message with a clear, concise subject line that matches the message body. Follow professional etiquette […]
New Phishing Scam – Fake Web Meeting Invitations
Hackers are launching new phishing campaigns disguised as Zoom or Microsoft Teams meeting invitations according to a recently released report issued by the cybersecurity firm Check Point Research. Hackers are also continuing to use COVID-19 to lure inattentive users into clicking on phishing messages for the purposes of deploying ransomware or stealing credentials. Some key […]
Have You Completed Your Cybersecurity Awareness Training?
All employees are required to complete the “Spring 2020 GHC Cybersecurity Awareness” course in D2L by 12:00pm on Friday, May 15th. Single Sign-On Accounts belonging to individuals who have not completed this training by Friday may be suspended or deactivated. You can ensure that you have successfully completed this training by viewing your completion grade […]
Reminder: (If You Use Zoom And Haven’t Done So Yet) Update to Zoom 5.0 before May 30th
Last week we announced the need to upgrade to Zoom 5.0. This is a follow-up reminder to please do so before May 30th. If you’ve already completed this upgrade, there is nothing further to do. Terse: If you have a GHC issued computer and use Zoom, please connect to VPN via Cisco AnyConnect to update Zoom before May 30th. A […]