Skip to main content
Texas A&M University
Technology Services
  • Services
    • IT Services A-Z
    • IT Services Directory
  • About
    • Leadership
      • Chief Information Officer
      • Associate Vice President for Enterprise IT Operations
      • AVP Enterprise Application Services
      • Chief Information Security Officer
      • Chief Technology Officer
      • AVP Enterprise Networks
      • AVP for IT Architecture and Design
      • Assistant Vice President of Product Management
      • Assistant Vice President of Strategic Partnerships & Alliances
      • Assistant Vice President for IT Academic Operations
      • Assistant Chief Information Officer of Operations
      • Chief of Staff
    • IT Governance
      • Purpose
        • IT Governance Definitions
      • Committees
        • Special Groups
        • CSCC
        • DGC
        • EITC
        • ESC
        • HTC
        • RTC
        • SATC
        • SEC
    • Strategic Initiatives
      • Priority Projects
        • 1. Next Generation Aggie Network
        • 2. Cisco VoIP Phone Service Upgrade
        • 3. Apple Device Management Unification
        • 4. TechHub Program Launch
        • 5. TeamDynamix Implementation
        • 6. Adobe Sign
    • Mission
      • Contact Us
      • Organizational Chart
        • Academic Operations
        • Strategic Alliances and Partnerships
        • Product Management & Communication
        • IT Enterprise Operations
        • Strategic Management
        • Enterprise Application Services
        • Architecture and Engineering
        • Networking and Telecommunications
        • IT Transformation
        • IT Security and Risk
    • Reports & Publications
    • News
  • Security
    • Safe Computing
      • Protect Your Device (current)
        • Protecting Desktops & Laptops
        • Protecting Mobile Devices
        • Stay Secure on Public Wi-Fi
      • Protect Your Identity
        • Protect Myself Top 5
        • Identity Theft
        • Spam
        • Safe Social Networking
        • File Sharing
        • Phishing Emails (& Internet Scams)
      • Protect University Data
        • Protect My Work Top 5
        • Protecting Confidential Information
        • Discovery and Open Records
        • Protecting the Workplace
        • International Travel
    • Cybersecurity Games
    • CAP
      • CAP Application
    • For IT Professionals
      • Best Practices
      • Compromised System Response
      • Incident Response Plan
  • Policy
    • IT Accessibility
    • Frequently Asked Questions
    • Policy Glossary
    • IT Policy
      • Controls Catalog
        • Controls Review Process
        • Controls Posted for Review
      • Exception Requests
      • Laws and Regulations
        • HIPAA
        • CUI
        • DMCA
      • Local Policy
        • Project Management
        • AV Surveillance
          • AVST Operational Standards
        • TAMU Network Use
          • Acceptable Use
          • Anonymous Proxy Servers
          • Guest Wireless Terms of Use
          • Traffic Engineering
          • NAT Devices
        • Cloud Computing at Texas A&M
    • IT Risk Management
      • Risk Assessment Procedures
        • IT Managed Checklist
        • Non-IT Pro Assessment Checklist
        • Dean/VP Approval Process
        • Reporting & Review
      • Risk Assessment Roles
        • CIO
        • CISO
        • Division Risk Assessment Coordinator
        • Non-IT Professional
      • Risk Remediation
    • IT Continuity of Operations
      • IT Disaster Recovery
        • Unit Level IT DR Planning
    • E-Discovery
      • Overview
      • IT Preservation Holds
        • Preservation Hold Process
      • Public Information Request
  • Community
    • Communities of Practice
    • Collaboration
    • IT Communication
      • Campus IT Contacts
      • IT Communication Channels
      • IT Websites
      • Change Management
    • IT Events
    • Tools
      • IT Standards
      • Data Classification + Research Resources
      • Impact Calculator
  • Help
  • Safe Computing
  • Cybersecurity Games
  • CAP
  • For IT Professionals
Safe Computing
  • Protect Your Device(current) Toggle Dropdown
    Protecting Desktops & Laptops Protecting Mobile Devices Stay Secure on Public Wi-Fi
  • Protect Your Identity Toggle Dropdown
    Protect Myself Top 5 Identity Theft Spam Safe Social Networking File Sharing Phishing Emails (& Internet Scams)
  • Protect University Data Toggle Dropdown
    Protect My Work Top 5 Protecting Confidential Information Discovery and Open Records Protecting the Workplace International Travel
  • IT Home
  • Security
  • Safe Computing
  • Protect Your Device

Protect Your Device

Our devices hold so much personal information these days. Safeguarding our devices can be intimidating. However, from hard passwords to antivirus software, protecting our devices can be simple and easy to maintain.  

  • Protecting Desktops & Laptops
  • Protecting Mobile Devices
  • Stay Secure on Public Wi-Fi
Services
  • IT Services A-Z
  • IT Services Directory
About
  • Leadership
  • IT Governance
  • Strategic Initiatives
  • Mission
  • Reports & Publications
  • News
Security
  • Safe Computing Guides
  • Cybersecurity Games
  • CAP
  • IT Professionals
Policy
  • IT Policy
  • IT Risk Management
  • IT Continuity of Operations
  • E-Discovery
  • IT Accessibility
Community
  • IT Events
  • IT Communication
  • Collaboration
  • Careers at Technology Services
Help
  • View IT Service Alerts
  • Get Tech Help
  • Search the Knowledge Base
  • New Student Tech Guide
Stay Connected

Give us your feedback, make suggestions, and ask questions.

Contact Us

  • Like us on Facebook
  • Follow us on Instagram
Services
  • IT Services A-Z
  • IT Services Directory
About
  • Leadership
  • IT Governance
  • Strategic Initiatives
  • Mission
  • Reports & Publications
  • News
Security
  • Safe Computing Guides
  • Cybersecurity Games
  • CAP
  • IT Professionals
Policy
  • IT Policy
  • IT Risk Management
  • IT Continuity of Operations
  • E-Discovery
  • IT Accessibility
Community
  • IT Events
  • IT Communication
  • Collaboration
  • Careers at Technology Services
Help
  • View IT Service Alerts
  • Get Tech Help
  • Search the Knowledge Base
  • New Student Tech Guide
Stay Connected

Give us your feedback, make suggestions, and ask questions.

Contact Us

  • Like us on Facebook
  • Follow us on Instagram
Texas A&M University
  • Technology Services
  • Site Map
  • Site Policies
  • Accessibility
Back to Top