IT Policy Update – Email

The below email policy and standard have been updated, approved by Cabinet, and issued: IT.PO.180 – Email Purpose  Email is the official form of written, electronic communication for Georgia Highlands College employees and should be used accordingly. The purpose of this policy is to define appropriate use of email.   Scope  This policy applies to […]

IT Policy Update – Bring Your Own Device (BYOD)

The below Bring Your Own Device (BYOD) policy and standard for employee-owned technology in use at the institution have been updated, approved by Cabinet, and issued: IT.PO.410 – Bring Your Own Device (BYOD) Purpose The purpose of this policy is to empower Georgia Highlands College employees to utilize personal computing devices in order to work […]

Are You Ready for Ransomware?

What Is Ransomware? Ransomware is a type of malicious software that encrypts your files. Often, the only way to decrypt and gain access to the files is by paying a “ransom” or fee to the attackers. The attackers might provide the decryption key allowing you to regain access to your files. Ransomware may spread to […]

Not Secure? What’s Wrong With These Websites?

Google is now marking unencrypted (http) websites as ‘Not Secure’ in the newest version of Chrome. This is the first major browser that will change how it presents information about the security of websites by ‘expecting’ them to be encrypted (https) by default and warning about unencrypted websites, rather than expecting users to check for […]

Secure Remote Access: As Easy As A-B-C

It is well publicized that today’s attackers are ever vigilant in their attempts to uncover weak points in networks, computers, and mobile devices to establish a foothold and leverage vulnerabilities, thus resulting in the compromise of critical assets or personal information. Areas of concern that can lead to a breach include the lack of physical […]

Phishing – It Just Takes One!

It is an unfortunate reality that virtually all email users regularly receive phishing messages. An Oregon state worker fell victim to one such message last Friday. That user’s computer was hijacked and subsequently used to send over 8,000,000 spam messages over the weekend. The account sent so much spam that it caused major email services […]

IT Policy Updates

The following policies governing technology at GHC have been updated, approved by Cabinet and issued: IT Acceptable Use Policy – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/EZ8y9pSrfWFJiVnXDKcNd0ABk-o2tQiVF8Bg-bJdKnsKcQ IT Acceptable Use Standard – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/ESA1u5vZd7BAtdOt-sh3SDEBSQaIbBwKpawlr2mr0cSdBQ IT Audit Policy – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/Eah3vaGc3tpCswkF5u73IHIBLJOjiOtC8-nDinB0zwVBkg IT Analog Line Policy – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/EZ1fH0kGEY1GrGZQKoJRwFEBWPOeAgYHMxuwxhIlZVMpnw IT Analog Line Standard – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/Ed9kkDS1qPlIqY8jYtPsznQBCDERuUw5UyISzkzCjBjaCQ Please familiarize yourself with these documents as soon as you have […]

Beef Up Your Physical Security

Employing good physical security practices does not have to include hiring a detachment of the queen’s guard for your campus (though this might be a nice attraction for prospective students!). Instead, just getting the word out to your community about the importance of a few basic physical security tips can substantially improve your institution’s security […]

Cybersecurity Basics: Installing an Ad Blocker

Did you know that ad blockers can protect you from malicious software (malware) embedded in advertisements? Even if you practice good “net hygiene” and stay away from the shadier parts of the web, many reputable websites have inadvertently exposed their users to malicious advertisements through syndicated advertisement networks. For example, Huffington Post and LA Weekly […]