Information Security

Articles related to information security, including data handling procedures, dealing with phishing and spam, multi-factor authentication, etc.

Categories (1)

Data Handling Procedures

Guidance on operationalizing the College's data classification policy with regards to collecting, storing, sharing, and disposing of data.

Articles (7)

Pinned Article How to report Phishing messages to the Technology Help Desk

A description of what Phishing is and how to report it at MHC.

Approved Generative AI tools at MHC

A list of the generative AI tools that have been reviewed and approved by LITS.

How to get your Bitlocker Recovery Key and regain access to your computer

Instructions for users having challenges with BitLocker on their Windows computers.

Hybrid and remote work security best practices

Keep the College's data and network secure!

Software update recommendations

Guidelines for patching and maintenance of operating systems and software for MHC systems

Understand Microsoft Office macros security

About macro security in Microsoft Office apps

Understand Crowdstrike Falcon Sensor updates

Crowdstrike's release cadence and recommendations are different than previous products. In general, we want to follow the recommended defaults and update devices to the previously-released version whenever a new version is released.