<?xml version="1.0" ?>

<rss version="2.0">


<channel>
<title>Home - All Categories - Information Technology  - IT Security  </title>
<link>https://kb.mc3.edu/category.php?id=45</link>
<description>This RSS Feed contains Articles of Category in the knowledge base. You can click on the title to view its content. Powered by PHPKB (https://www.phpkb.com)</description>
<item>
										<guid>https://kb.mc3.edu/article.php?id=847</guid>
										<title>College Data and Storage System  Quick Reference</title>
										<link>https://kb.mc3.edu/article.php?id=847</link>
										<description><![CDATA[    2016      College Data and Storage System Quick Reference         Acceptable Use       Do Not Use     1  User responsible for protection  encryption, backup, etc.    2    User responsible for maintaining separate copy for access upon separation ...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=956</guid>
										<title>What is a reputable and updated operating system?</title>
										<link>https://kb.mc3.edu/article.php?id=956</link>
										<description><![CDATA[    2016     What is a reputable and updated operating system?   A reputable operating system can be defined as any operating system that is actively supported by the company that created it. A reputable operating system should be able to receive...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=957</guid>
										<title>What is Anti-Malware?</title>
										<link>https://kb.mc3.edu/article.php?id=957</link>
										<description><![CDATA[       2016    What is Anti-Malware?    All guest devices are required to be running Anti-Malware program that can scan files in real-time. These are "Anti-Virus" programs that can scan new files coming onto the system to determine if they contain...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=958</guid>
										<title>What is a Strong Password?</title>
										<link>https://kb.mc3.edu/article.php?id=958</link>
										<description><![CDATA[       2016     What is a strong Password?    A strong password is critical to keeping your information safe, in general a longer simpler password is safer than a short complicated password. A strong password must:    Eight characters or more...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=959</guid>
										<title>What is a Reputable Firewall?</title>
										<link>https://kb.mc3.edu/article.php?id=959</link>
										<description><![CDATA[    2016        What is a Reputable Firewall?    All guest devices are required to be running a reputable firewall set up to block unsolicited incoming connections. A firewall will act as a gate keeper to the internet for your system. Some such...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=1029</guid>
										<title>Unblock a File &#40;Windows 10&#41;</title>
										<link>https://kb.mc3.edu/article.php?id=1029</link>
										<description><![CDATA[     2016     Unblock a File (Windows 10)      When running a file in Windows 10 that was downloaded from the internet, you may get a security warning that prevents the operation. If you trust the source of the file, use the following documentation...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=5848</guid>
										<title>Enrolling in Multi-Factor Authentication (MFA) for Enhanced Security</title>
										<link>https://kb.mc3.edu/article.php?id=5848</link>
										<description><![CDATA[    2021     Enrolling in Multi-Factor Authentication (MFA) for Enhanced Security       Multi-Factor Authentication or MFA is a process in which requires additional logins in order to view documents and access systems in a more secure setting. This...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=11373</guid>
										<title>Global protect update</title>
										<link>https://kb.mc3.edu/article.php?id=11373</link>
										<description><![CDATA[     2021     Updating Global protect software To keep your college issued computer up to date and protected, we will be upgrading the VPN software (GlobalProtect).The upgrade process will disrupt connectivity; thus, we are encouraging you to...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=11457</guid>
										<title>Restarting Global Protect - MACOS</title>
										<link>https://kb.mc3.edu/article.php?id=11457</link>
										<description><![CDATA[    2021     How To Restart Global Protect While Using a MAC      Use the spotlight search bar (magnifying glass) at the top of your screen and search for "terminal". Once terminal is open type "su jssremote" to gain administrative privilege&#039;s...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=11469</guid>
										<title>Phishing Reporting In Outlook</title>
										<link>https://kb.mc3.edu/article.php?id=11469</link>
										<description><![CDATA[ How to report a Phishing email Reporting a phishing email within the outlook client will initiate an automated investigation within Microsoft and alert the MC3 Security team.    Outlook on your Computer    1.Click the?Report Message buttonon the...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=12488</guid>
										<title>Safe Links - Usage and Description</title>
										<link>https://kb.mc3.edu/article.php?id=12488</link>
										<description><![CDATA[    2021     Safe Links       Safe Links is a tool used to prevent users from connecting to malicious links by confirming the links authenticity simultaneously as the user clicks.    Put your mouse over a link to verify its original URL. At the...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=12499</guid>
										<title>Recieving a Secure File</title>
										<link>https://kb.mc3.edu/article.php?id=12499</link>
										<description><![CDATA[      Receiving a Secure File        Secure File Transfer provides users with encryption of attached files to prevent lost or stolen file data. Below you will find the steps on how to access a file sent to you with this service.    1. You will...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=12500</guid>
										<title>Sending a Secure File</title>
										<link>https://kb.mc3.edu/article.php?id=12500</link>
										<description><![CDATA[    2021           Sending a Secure File      Secure File transfer provides users with encryption of attached files to prevent lost or stolen file data. Please advise that the message body of the email IS NOT encrypted so please be careful of the...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=12519</guid>
										<title>Anti-Spam and Anti-Phishing Protection</title>
										<link>https://kb.mc3.edu/article.php?id=12519</link>
										<description><![CDATA[    2021         Spam &amp; Phishing Email Defense  Microsoft offers an advanced solution to safeguard email inboxes to prevent cyber criminals from maliciously gaining access to information and data. The anti-spam and anti-phishing policies deployed...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=12584</guid>
										<title>MFA - Number Matching</title>
										<link>https://kb.mc3.edu/article.php?id=12584</link>
										<description><![CDATA[    2021     Number Matching with Microsoft Authenticator Number matching is the new and enhanced way to protect your account from compromise.  When you login to your email or another secure resource your push notification to your phone will prompt...]]></description>

									</item>
<item>
										<guid>https://kb.mc3.edu/article.php?id=12641</guid>
										<title>Phishing Simulation Program</title>
										<link>https://kb.mc3.edu/article.php?id=12641</link>
										<description><![CDATA[     2023     Phishing Simulation Program Like any skill, spotting phishing emails takes practice. Creating a consistent behavior like reporting suspicious emails, requires repetition. Our phishing awareness and reporting exercises are designed to...]]></description>

									</item>

</channel>

</rss>