Information Security

Best practices and instructions for handling security concerns pertaining to Information Technology including phishing, malware, etc.

Articles (11)

Accessing GRCC Resources While in Another Country

An explanation of where GRCC resources are available.

Apple Devices - How to Check for Updates

Information on how to update personal Apple products.

Best Practices for Working Remotely

The IT Security team has laid out some best practices for keeping yourself and your data safe while working remotely.

Data Classification

An explanation of the three different levels of data classification at GRCC

How to Secure a Mobile Device

Best practices for keeping your mobile device and the data contained in it secure.

Password Spraying

An explanation of Password Spraying and how to prevent attacks.

Phishing and How to Avoid It

Describes what a phishing e-mail is and what you can do when you receive one.

Reporting a Google Form as Spam/Phishing

A Google Form is breaching security by requesting sensitive information, including passwords.