Information Security

Best practices and instructions for handling security concerns pertaining to Information Technology including phishing, malware, etc.

Articles (8)

Accessing GRCC Resources While in Another Country

An explanation of where GRCC resources are available.

Best Practices for Working Remotely

The IT Security team has laid out some best practices for keeping yourself and your data safe while working remotely.

Data Classification

An explanation of the three different levels of data classification at GRCC

How to Secure a Mobile Device

Best practices for keeping your mobile device and the data contained in it secure.

Password Spraying

An explanation of Password Spraying and how to prevent attacks.

Report Spam Email to Google

How to report an unwanted SPAM email to Google to better improve their SPAM filtering.

What is Phishing

An explanation of Phishing