Information Security

A collage of words used in information technology

What's New?

Department Specialized Training

The Information Security Team will soon be teaming up with various GRCC Departments for Information Security Training that will be custom to the needs of the department. If you think your department could benefit from a session of department-specific training, please contact the IT Security Team at

Tips to stay safer online

  • Look for phishing, attackers send fake emails that look real for gaining information or payment. Tactics commonly seen include emails with a malicious file for recipients to open, directing recipients to a website to steal their login. For more information on phishing, visit our Phishing Training page.

  • Use a different password with every organization. For example, your personal email password should be different from your GRCC password. Free password managers exist to use at your own risk: LastPass, 1Password and Dashlane. To lessen risk, use a strong password and enable two-factor authentication.

  • Always lock your system when leaving view of it. A quick way to do this is by holding the Windows key (bottom left of the keyboard just left of Alt), also tap L as in lock. Remember WinLock to lock Windows.
  • If you are leaving your system for an extended period of time, log off and power off your system. This thwarts potential thieves from stealing critical information.
  • Consider using more than one factor for authentication. It has been common to use just a password to access accounts, nowadays there are safer ways to access accounts like pairing your password and an SMS text message containing a random key. Google has a free solution for their accounts; a more convenient solution relies on a USB U2F YubiKey from Yubico at $20. With Yubico's device, your keychain helps unlock your accounts.
  • Protect your emails as if they are the master key to everything digitally valuable to you. If an attacker gains access to your email, they could steal information from attachments and potentially reset passwords to other accounts.


What to do if you are a victim of cybercrime?

If the incident is GRCC related email otherwise visit the Homeland Security Investigations webpage or the Internet Crime Complaint Center for more information.