Search 315 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
Disabling DNS over HTTPS
Browsers on personal or work machines may have DNS over HTTPS (DoH) by default. IT Services has observed that these settings have been known to cause issues when connecting to services like ... Disabled.
Click Relaunch to relaunch the browser window with this change.
How To, Newer versions of Chrome:
In Chrome's settings, select 'Privacy and Security'
In 'Privacy
FAQ: Campus Authentication Portal
update your security questions or password.
Q: I forgot the answer to the security question: what do I do?
Please contact the IT Service Desk.
Walk-In Support: Galileo Hall Room 111
Phone Support: (925
What is Phishing?
Phishing is a type of attack carried out to steal usernames, passwords, credit card information, Social Security numbers, and/or other sensitive data. Phishing is most often seen in the form of ... our Security Awareness Course on Moodle. (Access the Course Now!)
If you think you've received a Phishing Email please mark it as Phishing in Gmail and forward it to it.security@stmarys-ca.edu
User unable to access GaelXpress.
and Security...
Next, click on Security on the right half of the page...
Next, scroll down the right half of the page to Advanced.
Directly under Advance will be the SecureDNS preferences
Canvas - How to: Enable third-party cookies for Proctorio support
Chrome
Click settings from the drop-down menu
Click Privacy and security
Click Cookies and other site data
Select either "Allow all cookies" or "Block third-party cookies in incognito"
There is no Save, it takes automatically
How-To setup 2-Factor Verification on Google
required to present something you know (Password) and something you have (your phone or other security key). ... Verification you add an extra layer of security to your account. Most people only have one layer - their password - to protect their account. With 2-Step Verification, if an attacker hacks through the
How to: Install, Access, Logout of the SMC Virtual Desktop
.
2. Click the All Apps icon
3. Click the VPN icon
4. You will see a connecting to VPN box and the OneLogin Security Questions. Enter the answer to the security question. (NOTE
Thunder Bird - Clearing Out Old Password
updated password for the account.
1. Open Thunderbird. From the top menu click Tools, then Options. A window will appear.
2. Click on the Security tab, then the Saved Passwords button. The Saved
How To Manually Set up SMC Wifi on a Mac OS X Computer
Security: WPA2 Enterprise
Mode: Automatic.
Username: Your SMC Username. Password: Your SMC Password.
Click OK.
The Verify Certificate window will pop up. Click Continue
The computer will open a
How To: Set up SMC Wifi on Windows 7
list of available WiFi networks, click on “Open Network and Sharing Center.”
Select “Manually Connect to a Wireless Network.”
Key in the following:
Network Name: SMC-WiFi Security: WPA2
How-To Secure Your Android Device
software onto your device unless you know and trust the source of that software, and you were expecting to receive it. Never ignore or override security prompts displayed by your device unless you are
Zoom: Curious about Zoom Bombing? Here are the Best Ways to Secure Your SMC Zoom Meetings
Zoom.us menu item> and click Check for Updates > and click the Update button and Install update as guided by the Zoom installer.
This update will enable the new Zoom Security Button. The
User Guide: Technology Quick Start Guide for Staff
.
Password Reset - As a measure of security you should change your initial password as soon as possible. Go to http://www.stmarys-ca.edu/password and follow the prompts to change your password. You
Technology Use Policy - Mobile Use Policy
Security Policy, immediately, to the Information Security Officer (ISO) and to their supervisor or department chair.
Related IT Policies
Saint Mary’s College of California Technology Use Policy
Technology Equipment Lending Timeframes
the DUE DATE. If there is sufficient inventory, IT Services may lend out comparable equipment at return of the current item. For security purposes, IT Services does not extend lending periods over the