Archive for July, 2012

Don’t Click That Link!: Computer Spam, Phishing, and Identity Theft

Friday, July 27th, 2012

Computer security is a complex subject, but with the right knowledge and powerful easy-to-use tools, ordinary users can protect themselves very effectively against the vast majority of security threats on the Internet.

During this session, Mark Branom of IT Services, and David Hoffman of the Information Security Office Operations discussed and demonstrated the workings of Stanford’s 2-Step authentication system. Watch this video to learn how 2-Step authentication protects your account against many password and phishing attacks.

Topics covered include:

  • Good security practices and password tips
  • How to use software available to the Stanford community
  • 2-Step authentication

Confluence Basics: Update

Friday, July 20th, 2012

Presenter: Kiran Joshi, Administrative Systems

Confluence is a wiki that allows teams to collaborate and capture knowledge. It allows users to create, share, and discuss ideas, meeting minutes, mockups, diagrams, task lists, and other documents.

This Tech Briefing covered the basics of using Confluence and provided information on how to request your own Confluence space for your team, department, or project.

Watch this session to learn how to:

  • Create pages and add content
  • Add gadgets such as Task Lists and Activity Streams
  • Embed Office files such as Excel spreadsheets, Word documents, Power Point presentations, and PDFs
  • Upload attachments and images
  • Use labels
  • Create a personal space

Mobile Device Management

Friday, July 13th, 2012

This Tech Briefing covered the university’s policy regarding mobile devices and how to protect your iOS device using Stanford’s award-winning Mobile Device Manager (MDM).

MDM allows you to quickly set up your Stanford email, calendar, and VPN. It also configures your device for the ISO’s security best practices. All of this is done in a quick (under 2 minutes!) set up that helps protect your data and protect yourself.

Mobile devices like the iPhone and iPad have become ubiquitous on campus. Mobile devices are expected to outsell traditional personal computers this year. Unfortunately, many users are unaware of their inherent security risks. Security features common on desktop and laptop computers are inconsistently applied across mobile device platforms. On a laptop, we have come to rely on anti-virus software safeguarding our system, but few mobile devices have such software. While most personal computers on campus are password-protected, few of us configure our mobile phones with a password or PIN to protect it against unauthorized use. And, since mobile devices are easily (and frequently) misplaced, the potential for unauthorized access increases.

Watch this video to learn more!