GT Antivirus Vendor Change

WHAT'S HAPPENING?
GT is transitioning from McAfee to Microsoft for its central antivirus service provider.


WHEN IS IT HAPPENING?
The change is in progress and will run through the end of February, 2014.


WHO IS AFFECTED?
Users with GT-provided McAfee products installed on their work or personal systems.  All such copies of McAfee must be uninstalled before March 1, 2014.


WHAT DO YOU NEED TO DO?

Latest Phishing Attempt

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.
 
 
WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.
 

Latest Phishing Attempt

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.


WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.

Latest Phishing Attempt

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include suspicious links. These are not legitimate emails.


WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the link. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.

Latest Phishing Attempt

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that include a suspicious attachment. These are not legitimate emails.


WHAT DO YOU NEED TO DO?
If you receive an email like this, do not open the attachment or click on the links. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.

Latest Phishing Attempt

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that direct users to follow a suspicious link. These are not legitimate emails.


WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the links. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at
http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.

Latest Phishing Attempt

WHAT'S HAPPENING?
There are emails that are being circulated, an example of which is below, that appear to come from "accounts-cc.gatech.edu". directing users to follow a link. These are not legitimate emails.


WHAT DO YOU NEED TO DO?
If you receive an email like this, do not click on the links. If a phishing or spam email makes its way into your inbox, please forward it according to the directions at http://support.cc.gatech.edu/support-tools/faq/what-should-i-do-when-i-receive-spam-or-phishing-email to improve the accuracy of GT's filters.

CoC User Account and Access Policy

ELIGIBILITY

User accounts for the computing and networking facilities of the College of Computing (CoC) are provided for the use of the College's staff, faculty, students and under appropriate circumstances, sponsored collaborators, in support of the College's administrative, instructional and research programs as described in the table below.