Best practices and instructions for handling security concerns pertaining to Information Technology including phishing, malware, etc.
An explanation of where GRCC resources are available.
Information on how to update personal Apple products.
The IT Security team has laid out some best practices for keeping yourself and your data safe while working remotely.
An explanation of the three different levels of data classification at GRCC
Best practices for keeping your mobile device and the data contained in it secure.
An explanation of Password Spraying and how to prevent attacks.
Describes what a phishing e-mail is and what you can do when you receive one.
A Google Form is breaching security by requesting sensitive information, including passwords.