MCCC Knowledge Base

IT Security Sub-Categories

IT Security Articles RSS Feed
Adding Trusted Sites (Windows 10)
Viewed 60523 times since Mon, Nov 21, 2016
2016 Adding Trusted Sites (Windows 10)   This primarily pertains to the enhanced security of Windows 10 and its blocking of materials from websites.  If you get security warnings that material from a source is insecure or blocked,... Read More
Allow sites to run Flash
Viewed 2394 times since Tue, Oct 10, 2017
2017 Allow sites to run Flash   This article has instructions on how to allow sites to run flash without prompting. It resolves the update flash issue when taking exams including Cisco and ATI exams. Firefox Full instructions available... Read More
College Data and Storage System Quick Reference
Viewed 3535 times since Wed, Jan 6, 2016
2016   College Data and Storage System Quick Reference   Acceptable Use   Do Not Use 1 User responsible for protection — encryption, backup, etc. 2  User responsible for maintaining separate copy for access upon... Read More
Creating a Rule for Secure File Transfer (SFT) Notifications
Viewed 2526 times since Wed, May 24, 2017
2017 Creating a Rule for Secure File Transfer (SFT) Notifications The following steps should be followed once you receive a notification from the Secure File Transfer (SFT) system. These instructions will assist you in creating a rule that... Read More
Enabling Automatic Updates
Viewed 3381 times since Mon, Jul 18, 2016
  2016 Enabling Automatic Updates Keeping your operating system up to date is a requirement for all devices on the network. For this reason all systems that are capable should have automatic updates enabled. Instructions for several... Read More
GlobalProtect VPN: Overview, Setup, and Troubleshooting
Viewed 3894 times since Wed, Nov 22, 2017
2019 GlobalProtect VPN: Overview, Setup, and Troubleshooting   GlobalProtect is used by Faculty and Staff members with College-owned devices to securely connect to the College when disconnected from their docking station.  Use of... Read More
How to Change or Update your Password - Complete Guide
Viewed 27178 times since Tue, May 24, 2016
2016 How to Change or Update your Password   In short, the key to creating a secure password is to be creative, use simpler but longer passphrases and use separate passwords for different applications.  Click here for more... Read More
Identity Finder - Scanning Removable Media
Viewed 4570 times since Fri, Mar 6, 2015
2016 Identity Finder - Scanning Removable Media   To scan a removable USB drive with Identity Finder insert the device into your computer and you will be prompted with the following message Select the Search now and prompt whenever a... Read More
InCommon Federation Participant Operational Practices (POP)
Viewed 4245 times since Fri, Feb 26, 2016
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ("Federation") enables a federation participating organization ("Participant") to use Shibboleth identity attribute sharing technologies to manage... Read More
Infographic: Multi-Factor Authentication for Secure Document Viewing
Viewed 1058 times since Wed, Jan 30, 2019
2019 Infographic: Multi-Factor Authentication for Secure Document Viewing Read More
LastPass - Password Manager - Mac
Viewed 4673 times since Fri, Jan 8, 2016
2016 LastPass - Password Manager - Mac   LastPass is a password manager that secures your online life. It will manage all your logins and passwords for you. Montgomery County Community College purchased and deployed LastPass for you to... Read More
LastPass - Password Manager - PC
Viewed 5035 times since Thu, Nov 12, 2015
2016 LastPass - Password Manager - PC  LastPass is a password manager that secures your online life. It will manage all your logins and passwords for you. Montgomery County Community College purchased and deployed LastPass for you to use... Read More
Multi-Factor Authentication for Enhanced Security
Viewed 1829 times since Tue, Jan 15, 2019
2018 Multi-Factor Authentication for Enhanced Security Multi-Factor Authentication or MFA is a process in which requires additional logins in order to view documents and access systems in a more secure setting. This can be used for... Read More
Phishing
Viewed 3874 times since Tue, Oct 28, 2014
2016 Phishing   Cyber criminals often attempt to acquire valuable information like usernames, passwords, credit cards, social security numbers, etc. You may hear the terms Phishing or Social Engineering when referring to the miscreants who... Read More
Protecting Sensitive Data
Viewed 5480 times since Mon, Mar 2, 2015
2015 Protecting Sensitive Data   The information age has created an explosion of information and an abundance of access to it. If you are doing personal business or acting on behalf of the college, you are likely handling sensitive... Read More
Remote Access Two-Factor Authentication Duo Security
Viewed 5296 times since Mon, Nov 24, 2014
2018 Remote Access Two-Factor Authentication Duo Security   Introduction In an effort to increase the security of College systems, the College IT Department is implementing a high-security login process for remote access. The process... Read More
Secured Print
Viewed 7492 times since Thu, Mar 12, 2015
2017 Secured Print   Instructions for completing a Secure Print on the Samsung MFD's.    1. Press Print… (or Ctrl+P)       2. Select your area MFD       3. Click the Preferences button       4.... Read More
Sending an encrypted email to an external email address
Viewed 10592 times since Thu, Mar 12, 2015
2016 Sending an encrypted email to an external email address   Faculty and staff can send encrypted email to accounts outside the @mc3.edu domain by including [Encrypt] within the email subject. See Also: Opening Encrypted Email... Read More
Setting up iPhone/iPad for Auto Screen Lock
Viewed 3672 times since Wed, Oct 15, 2014
    2016   Setting up iPhone/iPad for Auto Screen Lock To set Auto-Lock for iPhone, iPod touch, and iPad do the following:  Launch the Settings app.  Tap on Display & Brightness (or General for iOS versions 7, 8, & 9). ... Read More
Software Updates on College Owned Windows Computers
Viewed 3660 times since Wed, Jul 8, 2015
The following information pertains to all College owned, Windows OS computers. The College’s IT Department manages the software installed on all campus computers. To maintain secure and current software configurations, IT regularly deploys... Read More
Spirion (formerly Identity Finder) - Getting Started
Viewed 3610 times since Fri, Mar 6, 2015
2017 Spirion (formerly Identity Finder) - Getting Started   Introduction Spirion (formerly Identity Finder) is an application that is installed locally on computers and inspects storage media for personally identifiable information (PII).... Read More
Unblock a File (Windows 10)
Viewed 4143 times since Mon, Nov 21, 2016
2016 Unblock a File (Windows 10)   When running a file in Windows 10 that was downloaded from the internet, you may get a security warning that prevents the operation.  If you trust the source of the file, use the following... Read More
What is a reputable and updated operating system?
Viewed 3486 times since Mon, Jul 18, 2016
2016 What is a reputable and updated operating system? A reputable operating system can be defined as any operating system that is actively supported by the company that created it. A reputable operating system should be able to receive... Read More
What is a Reputable Firewall?
Viewed 3266 times since Mon, Jul 18, 2016
2016   What is a Reputable Firewall? All guest devices are required to be running a reputable firewall set up to block unsolicited incoming connections. A firewall will act as a gate keeper to the internet for your system. Some such... Read More
What is a Strong Password?
Viewed 3828 times since Mon, Jul 18, 2016
  2016 What is a strong Password? A strong password is critical to keeping your information safe, in general a longer simpler password is safer than a short complicated password. A strong password must: Eight characters or more... Read More
What is Anti-Malware?
Viewed 4170 times since Mon, Jul 18, 2016
  2016 What is Anti-Malware? All guest devices are required to be running Anti-Malware program that can scan files in real-time. These are "Anti-Virus" programs that can scan new files coming onto the system to determine if they contain... Read More

Need Help?