In accordance with the memo issued by Chancellor Wrigley concerning the requirement for all USG employees to participate in mandatory cybersecurity awareness training each October, GHC IT has provided the “AY2019 Cybersecurity” training module in D2L. Employee participation is mandatory and GHC will be required to report 100% compliance in November. To access this training: Go […]
Category Archives: Information Security
Reminder: Mandatory Cybersecurity Training in October
In accordance with the memo issued by Chancellor Wrigley concerning the requirement for all USG employees to participate in mandatory cybersecurity awareness training each October, GHC IT has provided the “AY2019 Cybersecurity” training module in D2L. Employee participation is mandatory and GHC will be required to report 100% compliance in November. To access this training: Go […]
USG-Mandated Cybersecurity Training in October
In accordance with the memo issued by Chancellor Wrigley concerning the requirement for all USG employees to participate in mandatory cybersecurity awareness training each October, GHC IT has provided the “AY2019 Cybersecurity” training module in D2L. Employee participation is mandatory and GHC will be required to report 100% compliance in November. To access this training: Go […]
National Cybersecurity Awareness Month – Let’s Play Hard to Get
In October, the University System of Georgia joins thousands of organizations observing the 16th annual National Cybersecurity Awareness Month. The overarching theme this year is “Own IT. Secure. IT. Protect IT.” Within the USG, cybersecurity incidents are far more likely to result from lapses of judgment when we let down our guard than from successful […]
The IT Team Can’t Do It Alone—Cybersecurity Is Everyone’s Responsibility
Did you know? In 2017 the education industry (which includes K–12 and higher education institutions) had 7,837,781 records breached in 35 events. To put that into perspective, the healthcare industry had 6,058,989 records breached in 428 events, and the retail industry had 123,652,526 records beached across 33 events. (See Privacy Rights Clearinghouse Chronology of Data Breaches, 2017 […]
Did You Play Words With Friends? If So, You’ve Been Breached
“In a statement, Zynga provided little detail on what data had been stolen but said that no financial information was compromised. The gaming giant says that it has taken steps to protect accounts, and that many users will be prompted by email notification to reset their passwords. You should change your password even if it’s […]
Instagram Phishing Scam – Fake Copyright Notices
“This time, the crooks are tapping into a concern that many of us have – falling foul of copyright law. Lots of us innocently post and repost photos, GIFs, video clips and screenshots that we find amusing, informative, scary, and so forth… …but even if we’re only ever posting photos that we took ourselves, we […]
Caution – Dependent Eligibility Documents in Email
Dependent verification documents and forms that contain personal information such as Social Security numbers, credit card or bank account numbers, medical information, or any other form of PII should not be handled in email. This is covered in the following IT policies: IT Acceptable Use Standard IT Email Policy Remember, PII is any information about […]
Information Security To Go!
Many people love the adventure that traveling provides: meeting new people, seeing new places, and having new experiences are part of the allure. Technology makes it easier than ever to satisfy our wanderlust. We can use our connected devices to discover the exotic locales we wish to visit, book tickets on planes and trains, practice […]
A Hacker Has My Password/Webcam And Is Demanding Bitcoins?!?
Have you received an email from a purported hacker who wants Bitcoins or some other form of cryptocurrency payment because they’ve somehow captured compromising information about you? Maybe they claim to have accessed your device’s camera or files and have your password as proof? Don’t panic. This is just an online scam commonly referred to […]