Traveling always requires some planning, not only deciding on what will go in your suitcase but also how to prepare and safeguard your computer, phone, and data. Preparing your computer and backing up may not be at the top of your list, but loss, theft, or accidental damage can happen, especially when traveling. A laptop or phone is easily replaceable – your data, photos, essays – not so easy. Continue reading “Travel Tech Tips for Devices and Data”
What and Why?
For years Brewster has not synchronized your computer login password with any other Brewster service. This has caused much confusion as users are required to remember several different passwords to access the tools that we need to use every day. Our deployment of Enterprise Connect resolves this issue by synchronizing your computers log in password with your Brewster Active Directory (Portal) password. We’ve been using this with the students since the beginning of the year, and the reduction in students forgetting their computer login passwords has dropped dramatically. It will also allow you to more easily change your Brewster Passwords (Portal, Moodle, Gmail, Wireless, PaperCut, Computer, etc.). Many faculty and staff users are already using this technology already and love it!
Full Computer Encryption (FV2)
What and Why?
As we know, laptops may be lost, stolen or otherwise end up in the hand of those who should not have access to our data. To this end, Brewster Academy will be encrypting all personally assigned, Brewster laptops (our phones are already encrypted). While I could get into great explanations about what encryption is, the long and the short of it is that it will prevent data from being taken from the laptop while it is shut off or sleeping. Right now, if your computer is lost or stolen, your password can be circumvented, allowing your data to be downloaded to another device.
Securing the internet is REALLY hard! There are SO MANY things to pay attention to! One of those things you need to pay attention to is whether the site you’re going to uses HTTPS (A Secured/registered site) or just HTTP: (An unsecured site that cannot prove it is who it says it is). This means that https://www.cnn.com is safe and http://www.cnn.com may NOT be. Continue reading “Stay safe online: Use HTTPS Everywhere.”
The following excerpts were pulled from an article posted on TechRepublic
It all starts in a Gmail account that has already been compromised. Reports say that perpetrators are accessing hacked accounts immediately and sending phishing messages to other Gmail addresses in the hacked accounts contacts list.
An email lands in the target inbox from the hacked address, and here’s where it gets tricky: The phishing email uses a legitimate subject line, text, and attachments from emails already sent by that account, making it look completely legitimate. Continue reading “Tricky Gmail Phishing Attack”
Mobile devices have become one of the primary ways we communicate and interact with each other. The power of a computer is now at our fingertips, allowing us to bank, shop, view medical history, attend to work remotely, and communicate virtually anywhere. With all these convenient features come added risks, but here are some tips to protect your devices and your personal information. Continue reading “Securing Mobile Devices”
When it comes to data you want to secure, your email accounts are probably close to the top of the list. The average hacker would love a peek at your email history full of password resets, not to mention getting potential access to your bank accounts or other private information. You can greatly increase the security of your Gmail account with 2-Step Authentication. Continue reading “Enable 2-Step Authentication on your Gmail Account”
Google states, “Two of the most common topics of questions regarding Google in general, and Google Cloud specifically, are security and privacy. We take both topics very seriously and offer tools that let you control how we process your data”. This is only a piece of the safety equation – the other piece falls to you the end-user.