What are AI Chatbots?

They are computer programs that are trained to understand and communicate with human language to answer user questions and generate automatic responses in the form of a conversation. What are five essential security tips I should keep in mind when using an AI chatbot for work purposes? 1. Only Use Organization-Approved Chatbots: Before using an […]

Five Common Ways People Get Hacked

While the intentions of cybercriminals vary, their approach to hacking people tends to follow a few general techniques. Let’s review five of the most common ways people are targeted and how you can protect yourself and your organization. Outdated Devices or Software Failure to run updates equals failure to patch critical security vulnerabilities. Cybercriminals can […]

Spear Phishing: The Advanced Threat

Phishing is a common scam that attackers use to steal data, spread malware, and defraud people of money. Most attacks involve a generic message sent to several people, often due to a database of contact information getting leaked online. Spear phishing, however, is anything but generic. This dangerous attack targets specific people or organizations, often […]

The Truth About Hackers

The people who commit cybercrime are often referred to as hackers or cybercriminals. To get a true sense of who those people are, it’s important to first dispel a few myths about the concept of “hackers” and focus on four important facts. Fact #1: Not all hackers are criminals. A hacker is commonly defined as […]

IT Maintenance Friday (System Security Updates)

The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, July 28th. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]

IT Policy Updates – Secure Application Development and Firewall

Two new IT policies have been approved by the July session of President’s Cabinet. IT Secure Application Development Policy – This policy ensures that web applications, web forms, and scripts are developed securely in order to protect organizational data from a loss of confidentiality, integrity, or availability due to malicious activity or unauthorized use.  IT […]

System Security Updates – Friday June 16th

Note: Our monthly updates have been move forward this month due to year-end processing. The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, June 16th. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working […]

Duo Security Update – Duo Verified Push

Securing information and information systems, products or services remains a core responsibility of Georgia Highlands College and GHC has a legal and ethical responsibility to protect information in its care with effective and industry-standard cybersecurity safeguards. Therefore, we’ve upgraded Duo Security at GHC with Duo Verified Push to add an additional layer of protection for […]

FBI Warns of “deepfakes” Being Used In Sextortion Email Scams

The FBI issued a cybersecurity public service announcement concerning the growing use of digitally manipulated images (known colloquially as ‘deepfakes’) in sextortion scams. “Sextortion, which may violate several federal criminal statutes, involves coercing victims into providing sexually explicit photos or videos of themselves, then threatening to share them publicly or with the victim’s family and friends. […]