Dependent verification documents and forms that contain personal information such as Social Security numbers, credit card or bank account numbers, medical information, or any other form of PII should not be handled in email. This is covered in the following IT policies: IT Acceptable Use Standard IT Email Policy Remember, PII is any information about […]
Category Archives: Information Security
Information Security To Go!
Many people love the adventure that traveling provides: meeting new people, seeing new places, and having new experiences are part of the allure. Technology makes it easier than ever to satisfy our wanderlust. We can use our connected devices to discover the exotic locales we wish to visit, book tickets on planes and trains, practice […]
A Hacker Has My Password/Webcam And Is Demanding Bitcoins?!?
Have you received an email from a purported hacker who wants Bitcoins or some other form of cryptocurrency payment because they’ve somehow captured compromising information about you? Maybe they claim to have accessed your device’s camera or files and have your password as proof? Don’t panic. This is just an online scam commonly referred to […]
Understanding the Basics of Online Safety and Security
Shopping, surfing, banking, gaming, and connecting ‘smart’ appliances such as toasters and refrigerators are some of the many actions performed each minute in cyberspace. These common everyday activities carry the cyber threats of social engineering to gain unauthorized access to data, identity theft, bullying, location tracking, and phishing, to name just a few. How can […]
Policy Updates: IT Wireless Network Security Policy, IT Privacy Policy
The following IT policies have been updated: IT Wireless Network (Wi-Fi) Security Policy (IT.PO.380) – Important changes to this policy include restrictions on the use of unapproved wireless infrastructure devices such as access points and routers and the explicit requirement for employees to use the secure GHC-Employee wireless network, were available, while performing work-related activities […]
$2 Million Cyberattack Cripples New York College
A ransomware attack crippled Monroe’s College’s email, website, and learning management system last week, with the attackers demanding $2,000,000 in Bitcoin to restore the affected systems. Other higher education institutions, such as Grinnell, Oberlin, and Hamilton College, were also subject to serious ransomware attacks on their systems this year. “Typically these attacks start with a […]
Keeping Tabs on Mobile Devices
With an increasing amount of sensitive data being stored on personal devices, the value and mobility of smartphones, tablets, and laptops make them appealing and easy targets. These simple tips will help you be prepared in case your mobile device is stolen or misplaced. Encrypt sensitive information. Add a layer of protection to your files by […]
Cryptocurrencies—Look Before You Leap!
Cryptocurrency comes under many names. You have probably read about some of the most popular types of cryptocurrencies such as Bitcoin, Litecoin, and Ethereum. Cryptocurrencies are increasingly popular alternatives for online payments. Before converting real dollars, euros, pounds, or other traditional currencies into ₿ (the symbol for Bitcoin, the most popular cryptocurrency), you should understand […]
2FA—Control in the Palm of Your Hand
Wouldn’t it be nice if your accounts could let you know when someone new is trying to get into them? Even better, wouldn’t it be terrific to make a stolen password useless? Rest easy, your account is safe! That’s essentially the control that two-factor authentication (2FA) gives to you. And, it only takes about two […]
Whaling, SMiShing, and Vishing…Oh My!
Cybercriminals use types of social engineering—manipulating people into doing what they want—as the most common way to steal information and money. Social engineering is at the heart of all types of phishing attacks—those conducted via email, SMS, and phone calls. Technology makes these sorts of attacks easy and very low risk for the attacker. Make […]