
Guides
Data Classification
Data is categorized to determine how to properly store and transmit it. At HCC, we separate data into three categories: Public, Confidential, and Regulated. Public data is information that can be found
The Importance of Encryption
In an era dominated by digital communication and data exchange, understanding the significance of encryption is crucial for maintaining the security and privacy of sensitive information. Encryption is a process that transforms readable data into a coded format, making it indecipherable to unauthorized users. This protective measure ensures that even if data falls into the wrong hands, it remains inaccessible without the appropriate decryption key.
One of the paramount reasons to prioritize encryption is the safeguarding of sensitive data during transit. When information travels between devices or over networks, it becomes vulnerable to interception by cybercriminals. Encryption acts as a virtual shield, rendering intercepted data useless to unauthorized entities. This is particularly pertinent for educational institutions like ours, where faculty, staff, and students exchange a wealth of confidential information daily, ranging from academic records to personal communication.
When it comes to securing emails, Outlook provides a robust platform for implementing encryption. To encrypt an email in Outlook:
- Select the "Options" tab and then click the drop-down menu next to "Encrypt" to view the different options.
- There are four options to choose from.
Encrypt-Only will encrypt the email and nothing else.
Do Not Forward will encrypt the email and prevent the email from being forwarded to other users.
Howard Community College - Confidential will encrypt the email and prevent it from being shared with external recipients. This option allows editing of the email but the email cannot be printed or copied.
Howard Community College - Confidential View Only will encrypt the email and prevent it from being shared with external recipients. This option does not allow editing, printing, or copying of the email. - Once an option is selected, you'll receive a message at the top of your email confirming which option you selected. From there you'll be able to send your email.
What to do if your account is compromised
Compromised Accounts Overview
When someone who is not you gains access to your credentials (i.e., username, passwords), your account is considered to be compromised. This means that unauthorized persons can use your credentials to pose as you and the privacy of your data is at risk. HCC Information Security monitors email traffic, logon IP location, and if our systems find a suspicious pattern or behavior, we will notify you that your account has been compromised. If you receive this notification, or if you notice that you are unable to log into your HCC email and HCC services with your HCC credentials, the sections below provide some steps that you can immediately take to protect your information. Additionally, be aware of any unprompted Duo notifications you may receive on your device as that may indicate somebody is trying to access your account.
Be suspicious of any email message that urges you to take immediate action; a false sense of urgency is a red flag for a phishing scam. Always remember that a legitimate message from HCC Information Technology will never ask that you enter your credentials.
Securing Your HCC Account
If your account is compromised, but you are still able to log into your HCC account.
Visit https://login.howardcc.edu/identity/self-service/hcc/smsreset.jsf and utilize the PIN reset feature to create a new password.
- Click here for instructions on how to reset your password using the PIN reset feature.
Need additional help?
https://howardcc.teamdynamix.com/TDClient/66/Portal/KB/ArticleDet?ID=11526