Tech Documentation

'Information Security' Archive


Posted March 29, 2017

Welcome back to SCAMALOT! In this spring 2017 edition, we continue to closely examine aspects of scam emails to help you identify similar attacks in the future. There is usually more than one way to determine if a message is legitimate or not, and by taking the time to look for phishy evidence in your […]

Email Spam & Phishing

Posted May 20, 2016

Spam email is unsolicited email sent to your email address. Here are some tips and tricks on how to avoid spam, as well as how to block it, and what to do if important emails are being marked as spam. What is spam? Spam is unsolicited email. Much like junk mail from the post office, […]

Password Safety

Posted October 1, 2015

Your College password allows you access to and ensures the protection of many on-campus services. It locks your computer which, when you log in, gives you access not only to the hard drive, but also your network drives, including your personal drive and any departmental or shared folders to which you have access. It keeps […]


Posted May 10, 2014

Welcome back to SCAMALOT!, the series where you can learn to be a better spam detective. In Part II, our heroes dove into two messages claiming to be from popular shipping companies and found a treasure trove of scam. This time, we explore a false message claiming to be from within our institution — those […]

Changing Your College Password

Posted August 5, 2013

If this is your first time setting up a Bryn Mawr College password, please contact the Help Desk for assistance. If you have a current, working password: Enter your College username at and click Submit. Verify your identity by entering your current, working password. Create a new password by typing one in in the […]


Posted January 18, 2013

Welcome to SCAMALOT!  In Part I, our heroes explored the anatomy of a scamtastic message claiming to be from Facebook.  In our continuing adventures, we will take a closer look at two messages which claim to be from popular shipping companies. Example 1 Let’s start with an easy one.  In our first example, we will […]


Posted December 14, 2012
fake facebook notification

Welcome to SCAMALOT!  This is part I of an ongoing series of posts devoted to helping you (yes, you!) become better email scam detectives. Scammers are clever, and some of them are pretty good at making an email look like the real thing, at least on the surface. So how do we distinguish a fake […]

Internet Safety and Email Etiquette: Tips and Resources for Students

Posted August 29, 2010

Staying safe and legal while on the Internet is an important responsibility for all internet users. We offer some tips and tricks for keeping yourself safe and your identity protected while on the Internet, as well as steps for recovering from a compromised account or online identity. For an easily printable .PDF version, please see […]

Protecting Your Data by Saving in Multiple Places

Posted July 30, 2009

It’s happened to all of us – something happens and, all of a sudden, you are unable to access any of the files on your computer. Since you cannot prevent the unexpected from happening, you should back up your files often, saving and storing them in multiple locations. This is especially important to do with […]

« Previous Page