Information Security

Articles related to information security, including data handling procedures, dealing with phishing and spam, multi-factor authentication, etc.

Categories (1)

Data Handling Procedures

Guidance on operationalizing the College's data classification policy with regards to collecting, storing, sharing, and disposing of data.

Articles (9)

Duo MFA: Enroll your MHC Account and set up the Duo Mobile app

Instructions to help NEW users enroll in Duo for the first time and configure the Duo Mobile app with Duo Push notifications.

Google 2FA: Enroll your MHC Account in Google 2-step verification

An introduction to 2-step verification and instructions for enrolling your MHC Account in Google 2-step verification.

Google 2FA: I can't access my MHC Google account because of Google 2-step verification

What to do if you can't log into your MHC Google account because you don't have access to your 2-step verification methods.

How to get your Bitlocker Recovery Key and regain access to your computer

Instructions for users having challenges with BitLocker on their Windows computers.

How to report Phishing messages to the Technology Help Desk

A description of what Phishing is and how to report it at MHC.

Hybrid and remote work security best practices

Keep the College's data and network secure!

Software update recommendations

Guidelines for patching and maintenance of operating systems and software for MHC systems

Understand Microsoft Office macros security

About macro security in Microsoft Office apps

Understand multi-factor authentication at MHC

An introduction to multi-factor authentication and the two systems that MHC uses to protect accounts: Google 2-step verification and Duo MFA.