Information Security @ Lesley
Lesley University's information security program works to protect the confidentiality, integrity, and availability of the university's information resources. This site provides resources designed to help our constituents minimize risk to information resources with minimal impact on its productive use.
Lesley Security Policies
Lesley University takes the security and privacy of our information and resources seriously. The purpose of these policies is to inform our constituents of our rules and procedures relating to usage, compliance, and security. Our policies can be found at https://lesley.edu/faculty-staff/technology/information-technology/it-policies.
Information Security Breach Procedure
Information security incidents or breaches are events that could have an adverse effect on the confidentiality, integrity, or availability of information resources at Lesley. Resources could be things like data, individual computers, servers, media, and mobile devices, as well as spoken information or paper. Prompt detection and appropriate handling of these security incidents or breaches are necessary to protect the institution’s information and constituents. If you see or hear something that doesn't seem right, email email@example.com.
- How to avoid phishing scams Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing emails can also try to get money directly, instead of just asking for account information. Learn how to avoid these phishing scams!
- Security Awareness (users will need to log in with their Lesley username and password in order to watch the video) Watch our security awareness videos so you have the information you need to protect your data (and Lesley’s data).
- How to create secure passwords Learn how to create secure and unique passwords for every website and application that you access….and don’t use the same password everywhere!
- Two-factor authentication explained Enable two-factor or multi-factor authentication on your important accounts like email or financial accounts. Watch the video to see details about why you should use multi-factor authentication.
Additional Resources on Information Security
- Check out Lesley’s information security best practices.
- For tips and tricks on protecting yourself from online dangers, check out the IT support site, and follow IT on Facebook and Twitter.
- The FTC & StaySafeOnline.org have great resources to help you (and people you know) use the Internet securely.
- Check out examples of Phishing emails