GHC Sites > Information Technology > Security Training Resources

Security Training Resources

Email Security

We depend on YOU to help keep us secure! The resources on this page provide valuable Information Security training for our faculty, staff, and students.

One of the most prevalent security threats in academia is phishing. Phishing is a form of email fraud that attempts to trick a user into giving out their personal information, such as account credentials, bank account or credit card numbers, and/or personally identifiable information. Phishing messages typically try to create a sense of urgency or scare users in order to lure victims into action. GHC will NEVER ask you for account-related information or other personal information by email (nor will any legitimate organization. So, the next time you receive an email supposedly from our help desk informing you that your “webmail quota has been exceeded” or that we are “upgrading our servers and need your password”, do NOT respond!

Email Safety Tips:

  • Use a strong password for your email accounts and do not share them with anyone. Use a separate password for every account.
  • Keep your devices up-to-date with the latest software security fixes.
  • Do not use your GHC email address as a “User Name” on unrelated sites or systems.
  • Be cautious about all communications; think before you click. Use common sense when communicating with users you DO and DO NOT know. Do not click on links in messages and never attempt to open unsolicited attachments.
  • Don’t reveal too much information about yourself. Depending on the information you reveal, you could become the target of identity or property theft.
  • Remember the golden rule of email: When in doubt, throw it out!


Information Security Resources

Cybersecurity Tip Cards


Online Training

Phishing Quiz – With Google – How good are you at spotting a phishing message? This interactive quiz is a great way to put your skills to the test!

NOVA Labs – Cybersecurity Lab – Take cybersecurity into your own hands with this PBS lab complete with videos and interactive games. Learn how the Internet can be insecure and ways organizations (and individuals) can protect themselves online.


How-to Guides

Electronic Frontier Foundation (EFF) – Delete Your Data Securely on Windows

Electronic Frontier Foundation (EFF) – Delete Your Data Securely on macOS

Electronic Frontier Foundation (EFF) – Enable Two-Factor Authentication – You’ve enabled two-factor authentication on your GHC accounts, but what about your personal email account, Twitter, or your online banking accounts? This guide provides a starting point for enabling two-factor authentication on many of the websites you use and rely on.


Information Security Presentations

Information Security 101 – Security presentation from 2012 Fall In-Service