MCCC Knowledge Base

IT Security Sub-Categories

IT Security Articles RSS Feed
Adding Trusted Sites (Windows 10)
Viewed 239133 times since Mon, Nov 21, 2016
2016 Adding Trusted Sites (Windows 10)   This primarily pertains to the enhanced security of Windows 10 and its blocking of materials from websites.  If you get security warnings that material from a source is insecure or blocked,... Read More
Allow sites to run Flash
Viewed 8579 times since Tue, Oct 10, 2017
2017 Allow sites to run Flash   This article has instructions on how to allow sites to run flash without prompting. It resolves the update flash issue when taking exams including Cisco and ATI exams. Firefox Full instructions available... Read More
Anti-Spam and Anti-Phishing Protection
Viewed 460 times since Wed, Mar 30, 2022
2021 Spam & Phishing Email Defense  Microsoft offers an advanced solution to safeguard email inboxes to prevent cyber criminals from maliciously gaining access to information and data. The anti-spam and anti-phishing policies... Read More
College Data and Storage System Quick Reference
Viewed 8283 times since Wed, Jan 6, 2016
2016   College Data and Storage System Quick Reference   Acceptable Use   Do Not Use 1 User responsible for protection — encryption, backup, etc. 2  User responsible for maintaining separate copy for access upon... Read More
Enabling Automatic Updates
Viewed 8381 times since Mon, Jul 18, 2016
  2016 Enabling Automatic Updates Keeping your operating system up to date is a requirement for all devices on the network. For this reason all systems that are capable should have automatic updates enabled. Instructions for several... Read More
Enrolling in Multi-Factor Authentication (MFA) for Enhanced Security: Downloading the Microsoft Authenticator App
Viewed 12025 times since Tue, Jan 15, 2019
2021 Enrolling in Multi-Factor Authentication (MFA) for Enhanced Security: Downloading the Microsoft Authenticator App Multi-Factor Authentication or MFA is a process in which requires additional logins in order to view documents and... Read More
Enrolling in Multi-Factor Authentication (MFA) for Enhanced Security: Text Message/Phone Authentication
Viewed 2960 times since Mon, May 24, 2021
2021 Enrolling in Multi-Factor Authentication (MFA) for Enhanced Security: Text Message/Phone Authentication   Multi-Factor Authentication or MFA is a process in which requires additional logins in order to view documents and access... Read More
F.A.Q. - Multi-Factor Authentication
Viewed 2810 times since Tue, May 25, 2021
2022 F.A.Q. - Multi-Factor Authentication Below are frequently asked questions about Multi-Factor Authentication and it's purpose in relation to you. Privacy Note: Enrolling in Multi-Factor Authentication does not give the College... Read More
Faculty and Staff - Best Practices for Hosting Secure Virtual Sessions/Meetings
Viewed 14412 times since Thu, Apr 9, 2020
2020 Faculty and Staff - Best Practices for Hosting Secure Virtual Sessions This article will provide you with information on the best practices for hosting secure virtual sessions. Information in this article is relevant to all of the... Read More
Faculty and Staff - Logging into a Mac Following a Password Reset
Viewed 8439 times since Mon, Mar 27, 2017
2021 Faculty and Staff - Logging into a Mac Following a Password Reset    Instructors are unable to login to their work Macbook after a password reset. This requires administrative password. 1. Make sure the user is connected to a... Read More
Faculty and Staff - Tips for a Secure Zoom Meeting
Viewed 13411 times since Fri, Apr 10, 2020
2020 Faculty and Staff - Tips for Hosting a Secure Zoom Meeting Hosting virtual meetings are great for connecting with people from the comfort of your home or on-the-go. It is important that you take the appropriate steps to ensure that... Read More
Global protect update
Viewed 2436 times since Mon, Mar 29, 2021
2021 Updating Global protect software To keep your college issued computer up to date and protected, we will be upgrading the VPN software (GlobalProtect). The upgrade process will disrupt connectivity; thus, we are encouraging you to... Read More
How to Change or Update your Password - Complete Guide
Viewed 72910 times since Tue, May 24, 2016
2016 How to Change or Update your Password   In short, the key to creating a secure password is to be creative, use simpler but longer passphrases and use separate passwords for different applications.  Click here for more... Read More
InCommon Federation Participant Operational Practices (POP)
Viewed 7777 times since Fri, Feb 26, 2016
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ("Federation") enables a federation participating organization ("Participant") to use Shibboleth identity attribute sharing technologies to manage... Read More
LastPass - Password Manager - PC
Viewed 10774 times since Thu, Nov 12, 2015
2016 LastPass - Password Manager - PC  LastPass is a password manager that secures your online life. It will manage all your logins and passwords for you. Montgomery County Community College purchased and deployed LastPass for you to use... Read More
Loaner Laptop First Logon Instructions
Viewed 2284 times since Thu, Jun 3, 2021
2021 College-Owned Laptop First Logon Instructions For Faculty/Staff college owned computers Turn on the computer.  On the logon screen, click the “no internet” icon in the lower right corner.  your home wifi from the list and... Read More
Phishing Reporting In Outlook
Viewed 1541 times since Wed, Nov 3, 2021
  How to report a Phishing email Reporting a phishing email within the outlook client will initiate an automated investigation within Microsoft and alert the MC3 Security team. Outlook on your Computer   1. Click the Report Message button... Read More
Protecting Sensitive Data
Viewed 11038 times since Mon, Mar 2, 2015
2015 Protecting Sensitive Data   The information age has created an explosion of information and an abundance of access to it. If you are doing personal business or acting on behalf of the college, you are likely handling sensitive... Read More
Recieving a Secure File
Viewed 791 times since Fri, Jan 21, 2022
  Receiving a Secure File    Secure File Transfer provides users with encryption of attached files to prevent lost or stolen file data. Below you will find the steps on how to access a file sent to you with this service. 1. You will... Read More
Restarting Global Protect - MACOS
Viewed 9766 times since Wed, Oct 6, 2021
2021 How To Restart Global Protect While Using a MAC     Use the spotlight search bar (magnifying glass) at the top of your screen and search for "terminal". Once terminal is open type "su jssremote" to gain administrative privilege's... Read More
Safe Links - Usage and Description
Viewed 1441 times since Mon, Dec 13, 2021
2021 Safe Links   Safe Links is a tool used to prevent users from connecting to malicious links by confirming the links authenticity simultaneously as the user clicks. Put your mouse over a link to verify its original URL. At the... Read More
Sending a Secure File
Viewed 775 times since Fri, Jan 21, 2022
2021   Sending a Secure File  Secure File transfer provides users with encryption of attached files to prevent lost or stolen file data. Please advise that the message body of the email IS NOT encrypted so please be careful of the... Read More
Sending an encrypted email to an external email address
Viewed 24380 times since Thu, Mar 12, 2015
2016 Sending an encrypted email to an external email address   Faculty and staff can send encrypted email to accounts outside the @mc3.edu domain by including [Encrypt] within the email subject. See Also: Opening Encrypted Email... Read More
Unblock a File (Windows 10)
Viewed 13590 times since Mon, Nov 21, 2016
2016 Unblock a File (Windows 10)   When running a file in Windows 10 that was downloaded from the internet, you may get a security warning that prevents the operation.  If you trust the source of the file, use the following... Read More
What is a reputable and updated operating system?
Viewed 7904 times since Mon, Jul 18, 2016
2016 What is a reputable and updated operating system? A reputable operating system can be defined as any operating system that is actively supported by the company that created it. A reputable operating system should be able to receive... Read More
What is a Reputable Firewall?
Viewed 7855 times since Mon, Jul 18, 2016
2016   What is a Reputable Firewall? All guest devices are required to be running a reputable firewall set up to block unsolicited incoming connections. A firewall will act as a gate keeper to the internet for your system. Some such... Read More
What is a Strong Password?
Viewed 8420 times since Mon, Jul 18, 2016
  2016 What is a strong Password? A strong password is critical to keeping your information safe, in general a longer simpler password is safer than a short complicated password. A strong password must: Eight characters or more... Read More
What is Anti-Malware?
Viewed 8288 times since Mon, Jul 18, 2016
  2016 What is Anti-Malware? All guest devices are required to be running Anti-Malware program that can scan files in real-time. These are "Anti-Virus" programs that can scan new files coming onto the system to determine if they contain... Read More

Need Help?