Computing is an essential part of our day-to-day existence. Unfortunately, cyber as well as physical threats abound, putting Brown as well as personal information at risk.
The Information Security Group (ISG) is charged with mitigating risk through the development and maintenance of Brown's information technology security strategy, IT policies and best practices, security training and awareness programs, ongoing risk assessments and compliance tasks. ISG strives to balance confidentiality (keeping private matters private), integrity (assuring that your information is complete and accurate) and availability (having timely and reliable access to your information).
ISG cannot do this alone. You play a key role in protecting information. By becoming aware of possible threats and vulnerabilities, you help to protect Brown as well as yourself. Here are some important first steps toward safe and more secure computing.
- Use Two-Step Verification: Because a Password isn't Enough (brown.edu/go/twostephelp)
- Play It Safe: Use Anti-Malware, a Firewall and Secure Wireless
- Lock It Up: Get a Cable, "Laptop LoJack" and a Good Password
- Keep It Current: Update Your Operating System and Software
- Don't Get Fooled: Identity Theft is a Growing Threat
- Do the Right Thing: Know What's Illegal and What the Risks Are
- Stay Informed: Check out the Phish Bowl | Read Security News
- Report Security Incidents: Contact ISG if you become aware of a security breach or compromise
NOTE: If you need immediate assistance, e.g., to report that your computer has been compromised, call the IT Service Center at 3-HELP or write to firstname.lastname@example.org. If you have any security-related questions, feel free to contact us at ISG@brown.edu.