Search8 Results

Phishing - What to watch out for and how to not be a victim of phishing attempts.
This article contains a list of IT security best practices pertaining to passwords, workstations, email, the Internet, mobile devices, telephones, removable storage, social media, and WiFi.
How to identify phishing links on Apple iPhones to avoid falling for malicious attacks and social engineering. (NOTE: This only applies to iPhones)
Central Piedmont allows only approved encrypted USB devices on college-managed devices, with OneDrive recommended as the primary solution. Employees needing a USB device can request one through the service portal, subject to approval.
This article covers Windows BitLocker Drive Encryption on college-owned employee devices.
This article is to address the security related reasons why OneDrive is not permitted to Sync with Non-domain joined devices (Personal Devices).