2021 Spam & Phishing Email Defense Microsoft offers an advanced solution to safeguard email inboxes to prevent cyber criminals from maliciously gaining access to information and data. The anti-spam and anti-phishing policies deployed... Read More
IT Security
Receiving a Secure File Secure File Transfer provides users with encryption of attached files to prevent lost or stolen file data. Below you will find the steps on how to access a file sent to you with this service. 1. You will... Read More
2021 Safe Links Safe Links is a tool used to prevent users from connecting to malicious links by confirming the links authenticity simultaneously as the user clicks. Put your mouse over a link to verify its original URL. At the... Read More
How to report a Phishing email Reporting a phishing email within the outlook client will initiate an automated investigation within Microsoft and alert the MC3 Security team. Outlook on your Computer 1. Click the?Report Message button on the... Read More
2021 How To Restart Global Protect While Using a MAC Use the spotlight search bar (magnifying glass) at the top of your screen and search for "terminal". Once terminal is open type "su jssremote" to gain administrative privilege's... Read More
2021 Enrolling in Multi-Factor Authentication (MFA) for Enhanced Security Multi-Factor Authentication or MFA is a process in which requires additional logins in order to view documents and access systems in a more secure setting. This... Read More
2016 What is a strong Password? A strong password is critical to keeping your information safe, in general a longer simpler password is safer than a short complicated password. A strong password must: Eight characters or more... Read More
2016 What is Anti-Malware? All guest devices are required to be running Anti-Malware program that can scan files in real-time. These are "Anti-Virus" programs that can scan new files coming onto the system to determine if they contain... Read More
2016 What is a reputable and updated operating system? A reputable operating system can be defined as any operating system that is actively supported by the company that created it. A reputable operating system should be able to receive... Read More
2016 College Data and Storage System Quick Reference Acceptable Use Do Not Use 1 User responsible for protection — encryption, backup, etc. 2 User responsible for maintaining separate copy for access upon separation ... Read More