Secure Remote Access: As Easy As A-B-C

It is well publicized that today’s attackers are ever vigilant in their attempts to uncover weak points in networks, computers, and mobile devices to establish a foothold and leverage vulnerabilities, thus resulting in the compromise of critical assets or personal information. Areas of concern that can lead to a breach include the lack of physical […]

Phishing – It Just Takes One!

It is an unfortunate reality that virtually all email users regularly receive phishing messages. An Oregon state worker fell victim to one such message last Friday. That user’s computer was hijacked and subsequently used to send over 8,000,000 spam messages over the weekend. The account sent so much spam that it caused major email services […]

IT Policy Updates

The following policies governing technology at GHC have been updated, approved by Cabinet and issued: IT Acceptable Use Policy – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/EZ8y9pSrfWFJiVnXDKcNd0ABk-o2tQiVF8Bg-bJdKnsKcQ IT Acceptable Use Standard – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/ESA1u5vZd7BAtdOt-sh3SDEBSQaIbBwKpawlr2mr0cSdBQ IT Audit Policy – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/Eah3vaGc3tpCswkF5u73IHIBLJOjiOtC8-nDinB0zwVBkg IT Analog Line Policy – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/EZ1fH0kGEY1GrGZQKoJRwFEBWPOeAgYHMxuwxhIlZVMpnw IT Analog Line Standard – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/Ed9kkDS1qPlIqY8jYtPsznQBCDERuUw5UyISzkzCjBjaCQ Please familiarize yourself with these documents as soon as you have […]

Beef Up Your Physical Security

Employing good physical security practices does not have to include hiring a detachment of the queen’s guard for your campus (though this might be a nice attraction for prospective students!). Instead, just getting the word out to your community about the importance of a few basic physical security tips can substantially improve your institution’s security […]

Cybersecurity Basics: Installing an Ad Blocker

Did you know that ad blockers can protect you from malicious software (malware) embedded in advertisements? Even if you practice good “net hygiene” and stay away from the shadier parts of the web, many reputable websites have inadvertently exposed their users to malicious advertisements through syndicated advertisement networks. For example, Huffington Post and LA Weekly […]

Digital Spring Cleaning – Be Green, Not Blue

As you upgrade your personal devices to the newest options, do you recycle the old equipment? Being green shouldn’t make you blue. Take steps now to remove anxiety later that forgotten sensitive files on your last laptop could become a source of embarrassment or identity theft. Trying to securely delete data at the time you […]

Office 365 Email Changes – Enhanced Scam and Phishing Protection

  Information Security and Network Services has completed the installation and configuration of a set of email filters to help protect Georgia Highlands College employees from phishing messages and scams. Messages sent from a non-GHC email address with dubious subjects (such as “Re-validate your account” or “Your inbox is over quota”) or containing embedded links […]

Attachments:
Screen-Shot-2018-03-15-at-4.30.59-PM.png

System Updates on Friday, Feb 23rd and Friday, March 2nd

Information Security & Network Services will be manually applying critical security updates to our Windows Servers tomorrow (Friday, February 23rd) and Friday, March 2nd due to known stability and compatibility issues with the January and February monthly “rollup” updates for Windows Server 2012. Some systems and network services such as Pharos printing and Office365 sign-on […]