Search 112 Results

Can't Find What You Are Looking For? Sign In Now
You are currently not logged in and some search results only show up if you login.

Office 365 Groups

Knowledge about Office 365 Groups with detailed information on configuring the group. ... with unique permissions or not Choose whether to Send an email invitation to each invitee or not Select Share. If you have chosen to do so, the people you share with get an email

Social Engineering

within that procedure. Social manipulation (or “engineering”: a term coined by hackers) was identified as early as 1991 as a successful technique for circumventing network and computer security. Because

Use of Strong Passwords

Summary Information security and personal privacy concerns permeate our daily lives, as our everyday work and study is significantly tied to processing and manipulating various kinds of data with

Electronic Data Classification and Security

administrative Bellevue College addresses is considered secure and may be used with discretion to disseminate confidential and sensitive information.  Confidential and sensitive information will not be

Basic Technology Security Expectations

Summary Bellevue College has a number of policies, procedures, standards defining how the institution and its diverse community of users will comply with state and federal information technology

Repeated Prompts to Unlock “Local Items” Keychain on a Mac

Knowledge about resolving issue with Keychain repeated prompts ... Summary Note: This article is about the “Local Items” keychain, not the “Login” keychain. This is for a Mac operating system If you are repeatedly being prompted to unlock the “Local Items

Configure Outlook Exchange Email on an Android Phone

Knowledge about Bellevue College credentials for assisting with configuring an Android device ... Summary Basic information needed to configure Outlook Exchange email on an Android Phone. Due to mobile phone manufacturer's ever changing mobile device settings, the following information are