Office 365 Device Support Changes

Microsoft Office 365 is ending support for older, obsolete HTTPS security protocols on October 31st, 2018. The following devices and browsers are known to be incompatible with current HTTPS security protocols and may no longer be able to connect to email: Android 4.3 and earlier versions Firefox version 5.0 and earlier versions Internet Explorer 8-10 on Windows 7 and earlier versions […]

Talking Cybersecurity Basics With Your Kids

Cybersecurity is a complex and constantly changing subject both in our workplace and in our personal lives thanks to social media, smart devices & appliances, voice assistants, and every other way that we stay connected to the world. Via naked security : “It’s crucial to arm kids with knowledge of how to protect themselves and their […]

Don’t Let a Phishing Scam Reel You In

Cybercriminals use phishing—a type of social engineering—to manipulate people into doing what they want. Social engineering is at the heart of all phishing attacks, especially those conducted via e-mail. Technology makes phishing easy. Setting up and operating a phishing attack is fast, inexpensive, and low risk: any cybercriminal with an e-mail address can launch one. […]

Do You Have a Personal Backup Plan?

The only way to protect yourself against valuable data loss is through regular backups. Ideally, important files should be backed up at minimum once a week, or every day, depending on how critical they are to you. This can be done manually, automatically, or using combination of the two methods. (Briefly review this 2017 backup awareness […]

Office 365 Device Support Changes

Microsoft Office 365 is ending support for older, obsolete HTTPS security protocols on October 31st, 2018. The following devices and browsers are known to be incompatible with current HTTPS security protocols and may no longer be able to connect to email: Android 4.3 and earlier versions Firefox version 5.0 and earlier versions Internet Explorer 8-10 on Windows 7 and […]

Iranian Hackers Targeting US Colleges

GHC IT has received information from the University System of Georgia Cybersecurity office and one of their strategic technology partners about an ongoing series of phishing attacks occurring against colleges and universities in the United States. It is believed that these attacks are sponsored by the Iranian government. This type of state-sponsored cybercrime has occurred […]

IT Policy Update – Email

The below email policy and standard have been updated, approved by Cabinet, and issued: IT.PO.180 – Email Purpose  Email is the official form of written, electronic communication for Georgia Highlands College employees and should be used accordingly. The purpose of this policy is to define appropriate use of email.   Scope  This policy applies to […]

IT Policy Update – Bring Your Own Device (BYOD)

The below Bring Your Own Device (BYOD) policy and standard for employee-owned technology in use at the institution have been updated, approved by Cabinet, and issued: IT.PO.410 – Bring Your Own Device (BYOD) Purpose The purpose of this policy is to empower Georgia Highlands College employees to utilize personal computing devices in order to work […]

Are You Ready for Ransomware?

What Is Ransomware? Ransomware is a type of malicious software that encrypts your files. Often, the only way to decrypt and gain access to the files is by paying a “ransom” or fee to the attackers. The attackers might provide the decryption key allowing you to regain access to your files. Ransomware may spread to […]

Not Secure? What’s Wrong With These Websites?

Google is now marking unencrypted (http) websites as ‘Not Secure’ in the newest version of Chrome. This is the first major browser that will change how it presents information about the security of websites by ‘expecting’ them to be encrypted (https) by default and warning about unencrypted websites, rather than expecting users to check for […]