Search results
We tend to think of social media like real life. We have a conversation or a thought and then move on – forgetting that in the digital world a copy could be kept forever, unless we take steps to remove it. This guide explains how to minimise any potential damage your previous use of social media...
Track changes can be used to lock a document. Any changes made to the document after it has been locked will feature in a list of 'tracked changes' that can be approved or denied. These are similar to comments but will update the original document if approved.
Turning on...
Please visit the Password manger help page for details of how to reset your password or unlock your account.
Please visit the Password manger help page for details of how to unlock your account or reset your password.
There are two stages to working with managed accounts. The account owner will need to follow the instructions in Part 1 (for a Generic or Shared Mailbox this will be the person named as responsible for it, if you are unsure who this is contact the SIZ). Part 2 is for the delegate (the person who...
Although we take all of the cyber security precautions that any other major organisation should do, there are some vulnerabilities that technology alone cannot fully avoid, and example of which, is social engineering (see section lower down). It is important that you are aware of how to...
Firstly, download the Microsoft Outlook app from one of the following app stores:
Then, after running the app, log on using your university email address and password.
...