CISO Memo: Data Collection & Protection

David SherryHave you ever stopped to think about all the data you collect at home? Old tax records, report cards from your children, mortgage and loan paperwork, receipts, bank statements, warranties…..the list goes on and on. If you took the time to do an inventory of your “stuff”, you would probably be shocked.
Read the rest of this entry »

Posted in Safe Computing, Summer 2011 Edition | Comments Off

IT Profile: Scott Martin & the ITSC

Scott MartinIn this edition, we spotlight Scott Martin, who has been the ITSC manager at CIS since the summer of 2010.  He recently celebrated his 15 year anniversary at Brown, working previously as the Technology Manager at the Annenberg Institute for School Reform for a dozen years.  Before that he’d worked at the Computer Store and CIS’s Service & Repair.
Read the rest of this entry »

Posted in Safe Computing, Summer 2011 Edition | Comments Off

Something New in the Air: Cloudpath Wireless

WizardThink of it like a wizard that makes it easier to use Brown’s secure wireless network.

CIS is currently piloting Cloudpath Wireless, an online solution that will help you configure your computer and/or smart phone1 for Brown-Secure wi-fi access.  The new service is now in production and available for general use.
Read the rest of this entry »

Posted in Safe Computing, Summer 2011 Edition | Comments Off

CIS to Adopt New Digital Cert Service

InCommon CertificatesCIS will update its SSL digital certificate* process by the end of the summer, moving from GeoTrust and adopting InCommon’s cert service. The move will mean new features and enhanced security.
Read the rest of this entry »

Posted in Safe Computing, Summer 2011 Edition | Comments Off

Mac Malware, HomeRun & Other Phish Tales

Little round green creature representing a virusThis past spring Brown computing users fell prey to some nasty malware and phishing schemes, like so many others did unfortunately.

The Help Desk and ISG continue to receive a steady stream of spam and phishing alerts, which is both bad and good.  While this shows that phishing continues to be an unrelenting threat, it also indicates that users are becoming more aware of their presence and avoiding them.
Read the rest of this entry »

Posted in Safe Computing, Summer 2011 Edition | Comments Off

Understanding Anti-Virus Software

Hand holding a hypodermic needleAny computer can be infected by malware. Malware is a catch-all term for malicious programs, such as viruses, worms, Trojans, and spyware, which are designed to infect and take control of your computer. Once your computer has been infected, bad guys can capture all your keystrokes, steal your documents, and use your computer to attack other computers.
Read the rest of this entry »

Posted in Safe Computing, Summer 2011 Edition | Comments Off

What Do You Know?

3 checkboxes from a survey, one checked, with pen and text "Survey"Wanted >>
A few minutes of your time to take a short survey about safe computing (participants become eligible for drawing)

Outcome >>
A current snapshot of how security-aware the Brown community is, which will be the basis for ISG’s future training
Read the rest of this entry »

Posted in Safe Computing, Summer 2011 Edition | Comments Off

Facebook: Safe, Not Sorry

Shield with text "Facebook Security" written beneath itIf you haven’t succumbed to the recently reported phenomenon of “Facebook fatigue” and closed your account, then you will need to continue your vigilance and maintain a certain awareness – and wariness – when using the social network site.

The three most important things to remember when using Facebook:
Read the rest of this entry »

Posted in Safe Computing, Summer 2011 Edition | Comments Off

Protecting Your Kids Online

Parents with young child, mom holding a laptopWe all want the best for our children, including the ability to leverage the latest in technology.  In today’s world, children need to understand technology not only to be competitive in their education and careers but also in many cases to develop and maintain active social lives.  However, with these capabilities come risks – risks that our children are often not aware of or prepared to deal with.  As parents, it is our responsibility to ensure our children understand these risks and how to protect themselves.  In this newsletter, we explain the top three threats to your children and how you can help them stay safe online.
Read the rest of this entry »

Posted in Safe Computing, Summer 2011 Edition | Comments Off