Information Security

A collage of words used in information technology

In 2018, Internet users are more aware of stolen identities and email hacking. While it is a great first step to be aware of threats on the Internet, having the right tools and knowing how to use them is critical.

Tips to stay safer online

  • Look for phishing, attackers send fake emails that look real for gaining information or payment. Tactics commonly seen include emails with a malicious file for recipients to open, directing recipients to a website to steal their login.
     
  • Use a different password with every organization. For example, your personal email password should be different from your GRCC password. Free password managers exist to use at your own risk: LastPass, 1Password and Dashlane. To lessen risk, use a strong password and enable two-factor authentication.
     
  • Always lock your system when leaving view of it. A quick way to do this is by holding the Windows key (bottom left of the keyboard just left of Alt), also tap L as in lock. Remember WinLock to lock Windows.
     
  • If you are leaving your system for an extended period of time, log off and power off your system. This thwarts potential thieves from stealing critical information.
     
  • Consider using more than one factor for authentication. It has been common to use just a password to access accounts, nowadays there are safer ways to access accounts like pairing your password and an SMS text message containing a random key. Google has a free solution for their accounts; a more convenient solution relies on a USB U2F YubiKey from Yubico at $18. With Yubico's device, your keychain helps unlock your accounts.
     
  • Protect your emails as if they are the master key to everything digitally valuable to you. If an attacker gains access to your email, they could steal information from attachments and potentially reset passwords to other accounts.

 

What to do if you are a victim of cybercrime?

If the incident is GRCC related email itsecurity@grcc.edu otherwise visit the Homeland Security Investigations webpage or the Internet Crime Complaint Center for more information.