Search13 Results

This article contains a list of IT security best practices pertaining to passwords, workstations, email, the Internet, mobile devices, telephones, removable storage, social media, and WiFi.
Tips on device security and data management.
Learn how to use the Microsoft Purview Information Protection (MIP) Client to label and protect files—including PDFs—directly from File Explorer, ensuring sensitive information is properly classified and secured before sharing.
During the holiday season, be aware of an increase in phishing emails, texts, and phone calls. Stay diligent and alert to potential scams, as cybercriminal activity tends to spike during this time. This article lists the top 10 key red flags to look out for in phishing emails, text messages, and phone calls.
Phishing - What to watch out for and how to not be a victim of phishing attempts.
Learn how to stay safe on social media by protecting your personal information, recognizing common online threats, and following simple steps to keep your accounts secure.
This article covers Windows BitLocker Drive Encryption on college-owned employee devices.
This article lists the countries where Central Piedmont systems are not accessible due to the Geofence
Central Piedmont allows only approved encrypted USB devices on college-managed devices, with OneDrive recommended as the primary solution. Employees needing a USB device can request one through the service portal, subject to approval.
This article is to address the security related reasons why OneDrive is not permitted to Sync with Non-domain joined devices (Personal Devices).
How to identify phishing links on Apple iPhones to avoid falling for malicious attacks and social engineering. (NOTE: This only applies to iPhones)