Search

Brewster Academy Blogs

Category

Security Awareness

Sync your Portal and Computer passwords with Enterprise Connect

What and Why?

For years Brewster has not synchronized your computer login password with any other Brewster service. This has caused much confusion as users are required to remember several different passwords to access the tools that we need to use every day. Our deployment of Enterprise Connect resolves this issue by synchronizing your computers log in password with your Brewster Active Directory (Portal) password. We’ve been using this with the students since the beginning of the year, and the reduction in students forgetting their computer login passwords has dropped dramatically. It will also allow you to more easily change your Brewster Passwords (Portal, Moodle, Gmail, PaperCut, Computer, etc.).  Many faculty and staff users are already using this technology already and love it!

Continue reading “Sync your Portal and Computer passwords with Enterprise Connect”

Computer Encryption with FileVault 2

Full Computer Encryption (FV2)

What and Why?

As we know, laptops may be lost, stolen or otherwise end up in the hand of those who should not have access to our data. To this end, Brewster Academy will be encrypting all personally assigned, Brewster laptops (our phones are already encrypted). While I could get into great explanations about what encryption is, the long and the short of it is that it will prevent data from being taken from the laptop while it is shut off or sleeping. Right now, if your computer is lost or stolen, your password can be circumvented, allowing your data to be downloaded to another device.

Continue reading “Computer Encryption with FileVault 2”

Password Protect a Folder

If you keep highly sensitive, personal documents on your computer, it is really a good idea to store them in a folder that is password protected.  Here is how to set up a pw protected folder. Continue reading “Password Protect a Folder”

Stay safe online: Use HTTPS Everywhere.

Securing the internet is REALLY hard! There are SO MANY things to pay attention to! One of those things you need to pay attention to is whether the site you’re going to uses HTTPS (A Secured/registered site) or just HTTP: (An unsecured site that cannot prove it is who it says it is). This means that https://www.cnn.com is safe and http://www.cnn.com may NOT be. Continue reading “Stay safe online: Use HTTPS Everywhere.”

Tricky Gmail Phishing Attack

The following excerpts were pulled from an article posted on TechRepublic

It all starts in a Gmail account that has already been compromised. Reports say that perpetrators are accessing hacked accounts immediately and sending phishing messages to other Gmail addresses in the hacked accounts contacts list.

An email lands in the target inbox from the hacked address, and here’s where it gets tricky: The phishing email uses a legitimate subject line, text, and attachments from emails already sent by that account, making it look completely legitimate. Continue reading “Tricky Gmail Phishing Attack”

Securing Mobile Devices

Mobile devices have become one of the primary ways we communicate and interact with each other. The power of a computer is now at our fingertips, allowing us to bank, shop, view medical history, attend to work remotely, and communicate virtually anywhere. With all these convenient features come added risks, but here are some tips to protect your devices and your personal information. Continue reading “Securing Mobile Devices”

Enable 2-Step Authentication on your Gmail Account

When it comes to data you want to secure, your email accounts are probably close to the top of the list. The average hacker would love a peek at your email history full of password resets, not to mention getting potential access to your bank accounts or other private information.  You can greatly increase the security of your Gmail account with 2-Step Authentication. Continue reading “Enable 2-Step Authentication on your Gmail Account”

Keeping Your Google Account Secure

Google states, “Ensuring that our customers’ data is safe, secure and always available to them is one of our top priorities.” This commitment on Google’s part is only a piece of the safety equation – the other piece falls to the end-user. Continue reading “Keeping Your Google Account Secure”

Be Aware of Phishing Attacks

Phishing is defined as the activity of defrauding an online account holder of financial or personal information by posing as a legitimate company. Continue reading “Be Aware of Phishing Attacks”

Blog at WordPress.com.

Up ↑