Security Best Practices

What are Best Practices in IT Security?

best_practices_lgBest practices are what information security experts have determined, through trial and error, and testing, to be the necessary elements of security required to provide the appropriate IT protections for our institution.

These elements, if they are to be effective (and compliant) require that they are implemented by our institution and our key partners. Partners such as outsourced labor, services, and suppliers may all need to adhere to GPC best practice guidelines and security elements or they may end up being our weak security link in the chain.

These security elements include:

  • Regular Risk Assessments and Vulnerability Assessments
  • Security Planning / Strategic Planning
  • Monitoring (Reporting), Evaluate and Adjust
  • Internal Policies
  • Communication and Training
  • Layered Security Infrastructure
  • User Access Control & Authentication
  • Data Integrity & Continuity Measures
  • Daily User Best Practices

What will Implementing Best Practices Security Do for GPC?

  • Provide the college with the best protection against internal and external security threats
  • Provide the core components needed to get an stay compliant with:
    • A growing list of security regulations
    • Partners who have strong security standards

What if We Don’t Employ Best Practices Security?

The college will be at risk on multiple levels. While we should never spend more that we can afford, sometimes we cannot afford NOT to ensure ourselves.

Follow the Best Practices presented on this site to help secure GPC’s assets as well as your personal information and data.

Best Practice Topic Areas

Email Security
Password Security
Data Backup
Computer Security
Protecting Sensitive Information
Social Engineering and Phishing
Mobile Device Security

Be sure to visit this page often as we will continually add and update the content here to keep things relevant.