Have you ever stopped to think about all the data you collect at home? Old tax records, report cards from your children, mortgage and loan paperwork, receipts, bank statements, warranties…..the list goes on and on. If you took the time to do an inventory of your “stuff”, you would probably be shocked.
Continue reading CISO Memo: Data Collection & Protection
In this edition, we spotlight Scott Martin, who has been the ITSC manager at CIS since the summer of 2010. He recently celebrated his 15 year anniversary at Brown, working previously as the Technology Manager at the Annenberg Institute for School Reform for a dozen years. Before that he’d worked at the Computer Store and CIS’s Service & Repair.
Continue reading IT Profile: Scott Martin & the ITSC
Think of it like a wizard that makes it easier to use Brown’s secure wireless network.
CIS is currently piloting Cloudpath Wireless, an online solution that will help you configure your computer and/or smart phone1 for Brown-Secure wi-fi access. The new service is now in production and available for general use.
Continue reading Something New in the Air: Cloudpath Wireless
CIS will update its SSL digital certificate* process by the end of the summer, moving from GeoTrust and adopting InCommon’s cert service. The move will mean new features and enhanced security.
Continue reading CIS to Adopt New Digital Cert Service
This past spring Brown computing users fell prey to some nasty malware and phishing schemes, like so many others did unfortunately.
The Help Desk and ISG continue to receive a steady stream of spam and phishing alerts, which is both bad and good. While this shows that phishing continues to be an unrelenting threat, it also indicates that users are becoming more aware of their presence and avoiding them.
Continue reading Mac Malware, HomeRun & Other Phish Tales
Any computer can be infected by malware. Malware is a catch-all term for malicious programs, such as viruses, worms, Trojans, and spyware, which are designed to infect and take control of your computer. Once your computer has been infected, bad guys can capture all your keystrokes, steal your documents, and use your computer to attack other computers.
Continue reading Understanding Anti-Virus Software
A few minutes of your time to take a short survey about safe computing (participants become eligible for drawing)
A current snapshot of how security-aware the Brown community is, which will be the basis for ISG’s future training
Continue reading What Do You Know?
If you haven’t succumbed to the recently reported phenomenon of “Facebook fatigue” and closed your account, then you will need to continue your vigilance and maintain a certain awareness – and wariness – when using the social network site.
The three most important things to remember when using Facebook:
Continue reading Facebook: Safe, Not Sorry
We all want the best for our children, including the ability to leverage the latest in technology. In today’s world, children need to understand technology not only to be competitive in their education and careers but also in many cases to develop and maintain active social lives. However, with these capabilities come risks – risks that our children are often not aware of or prepared to deal with. As parents, it is our responsibility to ensure our children understand these risks and how to protect themselves. In this newsletter, we explain the top three threats to your children and how you can help them stay safe online.
Continue reading Protecting Your Kids Online