Digital Health Checkup

It’s likely that at this very moment, some entity somewhere is collecting and storing your personal information. Even though data collectors are subject to multiple laws that are designed to protect your privacy, you can still take matters into your own hands. Here’s a quick questionnaire to help you maintain your digital well-being. Have you […]

Making Student Presentations Easier with Microsoft 365

A great way to reduce the amount of Microsoft 365 sign-ins and shuffling of USB drives during class presentations is with the File Request feature in OneDrive for Business. All GHC faculty single sign-on accounts have access to the OneDrive for Business app- you can visit yours by going to https://georgiahighlands2-my.sharepoint.com/ or by visiting portal.office.com […]

IT MAINTENANCE FRIDAY (SYSTEM SECURITY UPDATES)

The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, September 29th. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]

Data Protection Refresher

At the center of information security exists an ongoing effort to protect confidential information. Cybercriminals are constantly on the offensive, using a variety of tactics in hopes of stealing data and, by extension, money. Here’s a quick refresher of what’s at stake, how it’s vulnerable, and what you can do to ensure the privacy and […]

Fall 2023 Cybersecurity Awareness Training Goes Live Monday (09/25)

GHC’s Fall 2023 Cybersecurity Awareness Training campaign will launch a week early this year! Starting Monday, September 25th please visit https://training.knowbe4.com, sign on with your GHC single sign-on credentials, and complete the following training courses: 2023 Kevin Mitnick Security Awareness Training 2023 Social Engineering Red Flags You may also be required to complete a supplemental […]

Top 5 Simple Security Actions

Maintaining security and privacy requires a blend of technology and people. On the technology side, organizations often implement a variety of solutions designed to secure networks, filter out unwanted emails, and prevent unauthorized access. Technology is, of course, imperfect. It can’t prevent every threat, especially considering many external attacks are designed to circumvent technology. That’s […]

The Unplugged Threat

How hard is it to hack into an organization? In theory, it should be quite difficult. Most organizations implement robust cybersecurity controls and policies — the barriers that are designed to protect confidential information and prevent criminal hackers from breaching systems and networks. Hacking, however, doesn’t always require a computer; so those barriers only represent […]

GHC Policy Manual – IT Policy Updates

Four IT policy revisions have been approved by the September session of President’s Cabinet. IT Analog Line Policy – On August 2, 2019, the United States Federal Communications Commission granted Incumbent Local Exchange Carriers (ILECs) forbearance from price caps established in the Telecommunications Act of 1996. ILECs are no longer required to unbundle services or […]

IT Maintenance Friday (System Security Updates)

The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, September 8th. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]

Keeping Security Simple

What if you were told that phishing scams — attempts to steal information or infect devices with malicious software — were actually easy to launch? Not that they should be oversimplified, but all anyone needs is an internet connection and someone’s email address. That’s about it. Of course, there’s a big difference between successful and […]