To simplify your online life, you should keep your Brewster and personal email completely separate. If you have a personal Gmail account, you can easily toggle between accounts in Chrome. Continue reading “Manage Two Gmail Accounts in Chrome”
Using templates will help you with everything from essays to t-shirt order forms. Templates are available in Google Docs, Sheets, Slides and Forms. Be sure to check out all the templates as they will make your work easier by providing an outline for you to insert your information and work.
Did you know that you have a YouTube account? It’s part of your Brewster Google Suite of Apps just like Google Docs and Gmail. Taking video from your computer and uploading it to YouTube is rather simple. Here’s how to do it from scratch! Continue reading “Upload Video to YouTube”
The following excerpts were pulled from an article posted on TechRepublic
It all starts in a Gmail account that has already been compromised. Reports say that perpetrators are accessing hacked accounts immediately and sending phishing messages to other Gmail addresses in the hacked accounts contacts list.
An email lands in the target inbox from the hacked address, and here’s where it gets tricky: The phishing email uses a legitimate subject line, text, and attachments from emails already sent by that account, making it look completely legitimate. Continue reading “Tricky Gmail Phishing Attack”
Creating a slide presentation is nearly as common as reading e-mail here at BA. As we continue to focus on using the Google Suite of applications (Docs, Sheets, YouTube, etc), many find themselves using Google Slides (Google’s version of Keynote/PowerPoint). Here are some basic instructions on how to embed videos to your presentation. Continue reading “Add Video to a Google Slides Presentation”
Mobile devices have become one of the primary ways we communicate and interact with each other. The power of a computer is now at our fingertips, allowing us to bank, shop, view medical history, attend to work remotely, and communicate virtually anywhere. With all these convenient features come added risks, but here are some tips to protect your devices and your personal information. Continue reading “Securing Mobile Devices”