The concept of awareness refers to someone’s perception and knowledge of any given situation. Awareness serves many different purposes and is often applied to multiple use cases. For example, it’s common for various entities to raise public awareness, usually involving personal safety. The goal of public awareness campaigns is to educate large groups of people […]
Category Archives: Information Security
Becoming an Insider Asset
The challenge of mitigating threats requires a nuanced combination of people and technology. In theory, modern security technologies can help lower the chances of a phishing email finding your inbox, for example. In reality, even the latest and greatest versions of software or hardware are only as effective as the people that use them. That’s […]
Types of Insider Threats
Insider threats generally fit into three categories: Malicious: someone who intentionally harms an organization Negligent: someone whose carelessness harms an organization Accidental: someone whose mistake harms an organization Gaining an understanding of the different types of threats offers an opportunity to learn more about your role in protecting information. The Malicious Insider Malicious insiders are […]
Navigating the Threat Landscape
Information security presents an ongoing challenge for every organization in every industry. Meeting that challenge requires sound strategies and processes to help navigate the sprawling landscape of threats that put data, systems, and people at risk. As you might expect, most security efforts primarily focus on external threats — those that come from outside the […]
Self-Service Password Reset Changes Scheduled For Oct 25
The Division of Information Technology will be migrating our employee Self-Service Password Reset (SSPR) settings to newer, unified security mechanism within Microsoft 365. This change will occur at approximately 9:00am on Wednesday, October 25th. Here’s what you need to know. Why did we make this change? Microsoft is ending support for our existing Microsoft 365 […]
How To Report Suspicious Email Messages to IT
If you receive an email message that appears suspicious, click the Phish Alert button and the email will be deleted from your inbox and forwarded to our IT team for analysis. Sending IT screenshots or forwarding messages causes us to lose important forensic information and limits our ability to rapidly respond to identified threats. If […]
The Future of Data Protection
Accurately predicting the future requires an ability to build complex projection models based on previous trends. Where data protection is concerned, no such models are necessary, as it’s reasonable to assume two things will remain true for many years to come. The future will include aggressive and ongoing personal data collection. It’s hard to imagine […]
Digital Health Checkup
It’s likely that at this very moment, some entity somewhere is collecting and storing your personal information. Even though data collectors are subject to multiple laws that are designed to protect your privacy, you can still take matters into your own hands. Here’s a quick questionnaire to help you maintain your digital well-being. Have you […]
Making Student Presentations Easier with Microsoft 365
A great way to reduce the amount of Microsoft 365 sign-ins and shuffling of USB drives during class presentations is with the File Request feature in OneDrive for Business. All GHC faculty single sign-on accounts have access to the OneDrive for Business app- you can visit yours by going to https://georgiahighlands2-my.sharepoint.com/ or by visiting portal.office.com […]
IT MAINTENANCE FRIDAY (SYSTEM SECURITY UPDATES)
The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, September 29th. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]