Information Security To Go!

Many people love the adventure that traveling provides: meeting new people, seeing new places, and having new experiences are part of the allure. Technology makes it easier than ever to satisfy our wanderlust. We can use our connected devices to discover the exotic locales we wish to visit, book tickets on planes and trains, practice […]

Understanding the Basics of Online Safety and Security

Shopping, surfing, banking, gaming, and connecting ‘smart’ appliances such as toasters and refrigerators are some of the many actions performed each minute in cyberspace. These common everyday activities carry the cyber threats of social engineering to gain unauthorized access to data, identity theft, bullying, location tracking, and phishing, to name just a few. How can […]

Policy Updates: IT Wireless Network Security Policy, IT Privacy Policy

The following IT policies have been updated: IT Wireless Network (Wi-Fi) Security Policy (IT.PO.380) – Important changes to this policy include restrictions on the use of unapproved wireless infrastructure devices such as access points and routers and the explicit requirement for employees to use the secure GHC-Employee wireless network, were available, while performing work-related activities […]

$2 Million Cyberattack Cripples New York College

A ransomware attack crippled Monroe’s College’s email, website, and learning management system last week, with the attackers demanding $2,000,000 in Bitcoin to restore the affected systems. Other higher education institutions, such as Grinnell, Oberlin, and Hamilton College, were also subject to serious ransomware attacks on their systems this year. “Typically these attacks start with a […]

Keeping Tabs on Mobile Devices

With an increasing amount of sensitive data being stored on personal devices, the value and mobility of smartphones, tablets, and laptops make them appealing and easy targets. These simple tips will help you be prepared in case your mobile device is stolen or misplaced. Encrypt sensitive information. Add a layer of protection to your files by […]

Cryptocurrencies—Look Before You Leap!

Cryptocurrency comes under many names. You have probably read about some of the most popular types of cryptocurrencies such as Bitcoin, Litecoin, and Ethereum. Cryptocurrencies are increasingly popular alternatives for online payments. Before converting real dollars, euros, pounds, or other traditional currencies into ₿ (the symbol for Bitcoin, the most popular cryptocurrency), you should understand […]

2FA—Control in the Palm of Your Hand

Wouldn’t it be nice if your accounts could let you know when someone new is trying to get into them? Even better, wouldn’t it be terrific to make a stolen password useless? Rest easy, your account is safe! That’s essentially the control that two-factor authentication (2FA) gives to you. And, it only takes about two […]

Whaling, SMiShing, and Vishing…Oh My!

Cybercriminals use types of social engineering—manipulating people into doing what they want—as the most common way to steal information and money. Social engineering is at the heart of all types of phishing attacks—those conducted via email, SMS, and phone calls. Technology makes these sorts of attacks easy and very low risk for the attacker. Make […]