Best practices and instructions for handling security concerns pertaining to Information Technology including phishing, malware, etc.
An explanation of where GRCC resources are available.
The IT Security team has laid out some best practices for keeping yourself and your data safe while working remotely.
An explanation of the three different levels of data classification at GRCC
Best practices for keeping your mobile device and the data contained in it secure.
An explanation of Password Spraying and how to prevent attacks.
How to report an unwanted SPAM email to Google to better improve their SPAM filtering.
An explanation of Phishing