Google is now marking unencrypted (http) websites as ‘Not Secure’ in the newest version of Chrome. This is the first major browser that will change how it presents information about the security of websites by ‘expecting’ them to be encrypted (https) by default and warning about unencrypted websites, rather than expecting users to check for […]
Category Archives: Information Security
Secure Remote Access: As Easy As A-B-C
It is well publicized that today’s attackers are ever vigilant in their attempts to uncover weak points in networks, computers, and mobile devices to establish a foothold and leverage vulnerabilities, thus resulting in the compromise of critical assets or personal information. Areas of concern that can lead to a breach include the lack of physical […]
Phishing – It Just Takes One!
It is an unfortunate reality that virtually all email users regularly receive phishing messages. An Oregon state worker fell victim to one such message last Friday. That user’s computer was hijacked and subsequently used to send over 8,000,000 spam messages over the weekend. The account sent so much spam that it caused major email services […]
IT Policy Updates
The following policies governing technology at GHC have been updated, approved by Cabinet and issued: IT Acceptable Use Policy – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/EZ8y9pSrfWFJiVnXDKcNd0ABk-o2tQiVF8Bg-bJdKnsKcQ IT Acceptable Use Standard – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/ESA1u5vZd7BAtdOt-sh3SDEBSQaIbBwKpawlr2mr0cSdBQ IT Audit Policy – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/Eah3vaGc3tpCswkF5u73IHIBLJOjiOtC8-nDinB0zwVBkg IT Analog Line Policy – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/EZ1fH0kGEY1GrGZQKoJRwFEBWPOeAgYHMxuwxhIlZVMpnw IT Analog Line Standard – https://georgiahighlands2.sharepoint.com/:w:/g/ITS/Ed9kkDS1qPlIqY8jYtPsznQBCDERuUw5UyISzkzCjBjaCQ Please familiarize yourself with these documents as soon as you have […]
Beef Up Your Physical Security
Employing good physical security practices does not have to include hiring a detachment of the queen’s guard for your campus (though this might be a nice attraction for prospective students!). Instead, just getting the word out to your community about the importance of a few basic physical security tips can substantially improve your institution’s security […]
Cybersecurity Basics: Installing an Ad Blocker
Did you know that ad blockers can protect you from malicious software (malware) embedded in advertisements? Even if you practice good “net hygiene” and stay away from the shadier parts of the web, many reputable websites have inadvertently exposed their users to malicious advertisements through syndicated advertisement networks. For example, Huffington Post and LA Weekly […]
Use Strong Passwords and Passphrases to Lock Down Your Login!
Your passwords are the key to a host of information about you, and potentially those close to you. If someone can access your personal information, it can have serious long-term effects—and not just online! Follow these recommendations from the World Password Day website to protect your identity while making the Internet more secure for everyone: Use a […]
Digital Spring Cleaning – Be Green, Not Blue
As you upgrade your personal devices to the newest options, do you recycle the old equipment? Being green shouldn’t make you blue. Take steps now to remove anxiety later that forgotten sensitive files on your last laptop could become a source of embarrassment or identity theft. Trying to securely delete data at the time you […]
Office 365 Email Changes – Enhanced Scam and Phishing Protection
Information Security and Network Services has completed the installation and configuration of a set of email filters to help protect Georgia Highlands College employees from phishing messages and scams. Messages sent from a non-GHC email address with dubious subjects (such as “Re-validate your account” or “Your inbox is over quota”) or containing embedded links […]
How to Protect Your Data and Devices While Traveling with Tech
Due to enhanced security measures in most countries, travelers with tech should be prepared for possible disruptions or additional wait times during the screening process. Here are some steps you can take to help secure your devices and your privacy. Good to know: While traveling within the United States, TSA agents at the gate are not allowed […]