Policy Updates: IT Wireless Network Security Policy, IT Privacy Policy

The following IT policies have been updated: IT Wireless Network (Wi-Fi) Security Policy (IT.PO.380) – Important changes to this policy include restrictions on the use of unapproved wireless infrastructure devices such as access points and routers and the explicit requirement for employees to use the secure GHC-Employee wireless network, were available, while performing work-related activities […]

$2 Million Cyberattack Cripples New York College

A ransomware attack crippled Monroe’s College’s email, website, and learning management system last week, with the attackers demanding $2,000,000 in Bitcoin to restore the affected systems. Other higher education institutions, such as Grinnell, Oberlin, and Hamilton College, were also subject to serious ransomware attacks on their systems this year. “Typically these attacks start with a […]

Keeping Tabs on Mobile Devices

With an increasing amount of sensitive data being stored on personal devices, the value and mobility of smartphones, tablets, and laptops make them appealing and easy targets. These simple tips will help you be prepared in case your mobile device is stolen or misplaced. Encrypt sensitive information. Add a layer of protection to your files by […]

Cryptocurrencies—Look Before You Leap!

Cryptocurrency comes under many names. You have probably read about some of the most popular types of cryptocurrencies such as Bitcoin, Litecoin, and Ethereum. Cryptocurrencies are increasingly popular alternatives for online payments. Before converting real dollars, euros, pounds, or other traditional currencies into ₿ (the symbol for Bitcoin, the most popular cryptocurrency), you should understand […]

2FA—Control in the Palm of Your Hand

Wouldn’t it be nice if your accounts could let you know when someone new is trying to get into them? Even better, wouldn’t it be terrific to make a stolen password useless? Rest easy, your account is safe! That’s essentially the control that two-factor authentication (2FA) gives to you. And, it only takes about two […]

Whaling, SMiShing, and Vishing…Oh My!

Cybercriminals use types of social engineering—manipulating people into doing what they want—as the most common way to steal information and money. Social engineering is at the heart of all types of phishing attacks—those conducted via email, SMS, and phone calls. Technology makes these sorts of attacks easy and very low risk for the attacker. Make […]

IT Policy Updates – Passwords (Multi-factor), Encryption, Data Disposal, and Risk Management

The following updated IT policies and their associated standards have been reviewed and approved by Cabinet: IT Electronic Data Disposal Policy – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/ESmXprwuRHVMq0-gp5bO-8kBOXE0IatWCbXxx9rSx8XYaw IT Electronic Data Disposal Standard – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/EeJqINIH5lBHqkd81WkPzjEBuQsCNpqw4V6slTWMJXlkRg IT Encryption Policy – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/EZ-tzrq-PhdOq9N7Gqj_LGsBs81OkTz_0irom_4qf10beQ IT Encryption Standard – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/EYN1HrEsa_xGiuMi6ozhNmYBsLHxqTYSzxFZFmEEnLeYgQ IT Password Protection Policy – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/ESlbUNJkufNGm7eST5GP7DsBwxcTr3h3sahx99mjcHISrA IT Password Protection Standard – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/EWghQd08O_9BrHYpBuSWf-QBG2k6TKsWq38HoZP735G6nw IT Risk Management […]

Email at GHC: What You Need to Know

Email Forwarding Email that employees send and receive is subject to the Georgia Open Records Act. Utilizing a third-party (personal) email account for work purposes puts an employee at risk by making his/her personal account subject to open records requests by members of the public, regardless of their legal merit. This activity also puts the […]

Phishing: What You Need to Know

Information Security and Network Services has updated our email filters in order to help protect Georgia Highlands College employees from phishing messages and scams. Messages sent from outside our employee email environment- including ones sent by students- will be tagged with the following notice: CAUTION: This message originated from outside the Georgia Highlands College employee email […]