2021 Updating Global protect software To keep your college issued computer up to date and protected, we will be upgrading the VPN software (GlobalProtect).The upgrade process will disrupt connectivity; thus, we are encouraging you to... Read More
IT Security
2023 Phishing Simulation Program Like any skill, spotting phishing emails takes practice. Creating a consistent behavior like reporting suspicious emails, requires repetition. Our phishing awareness and reporting exercises are designed to... Read More
2016 How to Change or Update your Password In short, the key to creating a secure password is to be creative, use simpler but longer passphrases and use separate passwords for different applications. Click here for more information... Read More
2021 Enrolling in Multi-Factor Authentication (MFA) for Enhanced Security: Text Message/Phone Authentication Multi-Factor Authentication or MFA is a process in which requires additional logins in order to view documents and access... Read More
2021 Enrolling in Multi-Factor Authentication (MFA) forEnhanced Security: Downloading the Microsoft Authenticator App Multi-Factor Authentication or MFA is a process in which requires additional logins in order to view documents and... Read More
2021 College-Owned Laptop First Logon Instructions For Faculty/Staff college owned computers Turn on the computer. On the logon screen, click the no internet icon in the lower right corner.your home wifi from the list and enter your home... Read More
2019 GlobalProtect VPN:Overview, Setup, and Troubleshooting GlobalProtect is used by Faculty and Staff members with College-owned devices to securely connect to the College when disconnected from their docking station. Use of... Read More
2021 Number Matching with Microsoft Authenticator Number matching is the new and enhanced way to protect your account from compromise. When you login to your email or another secure resource your push notification to your phone will prompt... Read More
2021 Sending a Secure File Secure File transfer provides users with encryption of attached files to prevent lost or stolen file data. Please advise that the message body of the email IS NOT encrypted so please be careful of the... Read More
2016 What is a Reputable Firewall? All guest devices are required to be running a reputable firewall set up to block unsolicited incoming connections. A firewall will act as a gate keeper to the internet for your system. Some such... Read More