To show the actual destination of a link, "hover to discover" with your mouse. For a touch-based de...
If you accidentally delete emails in Google Mail, you can restore them in Postini: Search for the m...
Note that you may see features in the Postini interface that do not apply to Brown's use of Postini....
Postini is only available to a small subset of accounts at Brown. You should have received a notific...
Read and follow the document Data Removal Recommendations (brown.edu/go/sanitize-device) for specifi...
The FTC has compiled a checklist to guide you through the anxious period after learning that your in...
Click on the red Emergency button at the bottom of the screen. Select from the options: Call ...
Facebook has becomes a gateway providing easy access to a variety of other applications. While conve...
Here are some of our favorite tips for securing your Android phone or tablet. We also recommend che...
Here are some of our favorite tips for securing your iOS phone or tablet. We also recommend checkin...
LastPass is a password manager that makes your internet experience easier and safer by automatically...
You may be able to spot a phish when you receive one, but how are you when it's something that you'r...
Install anti-malware software and keep it current. Anti-Virus: System Center Endpoint Protection (of...
As part of an initiative to secure network devices at Brown, two significant changes are being made ...
Creating a profile gives Brown's Department of Public Safety access to descriptive details and medic...
This article is specifically for the Browser Hijacker "Weknow.ca" It changes your browser default ...
What are cookies? Cookies are browsing information collected in small text files that a website pla...
If you become aware of an event that could result in a breach of personally identifiable information...
Here are ISG's Ten Travel Tips for your mobile device, especially for those traveling outside of the...
The following tips can help lower your risk of becoming a victim of identity theft. Protect your So...
Malware ("malicious software") -- spyware, bogus anti-virus apps, rogueware, viruses, scareware, tro...
Protecting your laptop, small mobile devices, and your even smaller thumbdrives / smart cards / memo...
In addition to phishing emails, scams can originate via the telephone (sometimes called "vishing" fo...