Skip to main content

IT Security

As a member of the Montgomery College Community, you have the responsibility to always use College computer technology in a secure and appropriate manner.

The resources listed below are provided to better assist you in these efforts.

Phishing is a fraudulent email based attack disguised as a legitimate communication. The goal of the attacker is to trick the recipient into responding by clicking on a link, opening an attachment, or directly giving up account credentials, i.e. username and password.
Two-Factor Authentication
Two-Factor Authentication (2FA)
You may have heard or experienced Two-Factor Authentication (2FA) through your interactions with online banking, Gmail, and when logging into Facebook, Paypal, Twitter, and LinkedIn from a new machine. But what exactly is 2FA and why is MC adopting it?


Pod Image
Passwords, wifi, and malware
A strong password is your first line of defense when protecting your information. It is important to develop a password that is easy for you to remember, but not easy for someone else to guess. Developing a good password takes some thought. Do you have a strong password?
MC student at a computer in a cybersecurity lab
October is Cybersecurity Awareness Month
National Cybersecurity Awarness Month (NCSAM) raises awarenes about the importance of cybersecurity across our Nation, not just in the month of October, but all year long.
Data Classification and Storage Matrix
Per the confidential data management policy, #66002, this Data Classification Matrix (PDF, Get Adobe Acrobat PDF Reader.-Link opens in new window.) outlines where College data should be stored.