Fake Payment Notices, Receipts, and Invoice Scams: A Growing Threat

GHC’s Cybersecurity team has been receiving steady increase in reports of phishing scams involving fake invoices, sales receipts, and other forms of payment request. The universal goal of these scams is to trick you into thinking before clicking by either responding to these messages or visiting a malicious website. Please remain vigilant for the warning […]

Microsoft Ends Office 365 Support for Internet Explorer 11

Microsoft will officially end support for Internet Explorer 11 in Microsoft Office 365 next Tuesday (August 17th). Please ensure you’re using Mozilla Firefox, Google Chrome, Microsoft Edge, or Apple’s Safari web browser to access Office 365 and GHC’s Single Sign-On services. Internet Explorer 11 is Microsoft’s final version of the aging web browser and it […]

Microsoft Office 365 Password Self-Service for GHC Students

The Division of Information Technology will be implementing a new password self-service feature for Microsoft Office 365 on Monday, May 17th. Once this feature is enabled, you’ll be automatically prompted to enter your mobile phone number and/or a series of security questions when you access Microsoft Office 365 for email. Once this enrollment process is […]

Don’t Let Tax Scams Be Taxing

With apologies to Benjamin Franklin, nothing in this world can be said to be certain except death, taxes, and tax scams. As we enter the US tax preparation season, scams targeting taxpayers are in full swing. Here are some tips you can follow during tax season to keep scams from taxing you (See what I did […]

Online Privacy Tips

The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide Personally Identifiable Information (PII) such as your name, date of birth, account numbers, passwords, and location information. #BeCyberSmart when sharing personal […]

Phishing

Phishing attacks use email or malicious websites to infect your machine with malware and viruses in order to collect personal and financial information. Cybercriminals attempt to lure users to click on a link or open an attachment that infects their computers, creating vulnerability to attacks. Phishing emails may appear to come from a real financial […]

Creating a Better Password

Creating a strong password is an essential step to protecting yourself online. Using long and complex passwords is one of the easiest ways to defend yourself from cybercrime. No one is immune to cyber risk, but #BeCyberSmart and you can minimize your chances of an incident. SIMPLE TIPS: Creating a strong password is easier than […]