Let’s make it official
Ready to become a Lynx? We are still accepting applications, but housing and class registration are first-come, first-served.

Information Security at Lesley

Lesley University's information security program works to protect the confidentiality, integrity, and availability of the university's information resources. This page provides resources designed to help our constituents minimize risk to information resources with minimal impact on its productive use.

Lesley Security Policies

At Lesley, we take the security and privacy of our information and resources seriously. The purpose of these policies is to inform our constituents of our rules and procedures relating to usage, compliance, and security. Review our policies here.

Information Security Breach Procedure

Information security incidents or breaches could have an adverse effect on the confidentiality, integrity, or availability of information resources at Lesley. Resources could be data, individual computers, servers, media, and mobile devices, as well as spoken information or paper. Prompt detection and appropriate handling of these security incidents or breaches are necessary to protect the institution’s information and constituents. If you see or hear something that doesn't seem right, email it@lesley.edu.

Remote Work Security Resources

Video Resources

  • How to avoid phishing scams: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing emails can also try to get money directly, instead of just asking for account information. Learn how to avoid these phishing scams.
  • Security Awareness: Log in with their Lesley username and password to watch the video. Watch our security awareness videos so you have the information you need to protect your data (and Lesley’s data).
  • How to create secure passwords: Learn how to create secure and unique passwords for every website and application that you access. And don’t use the same password everywhere!
  • Two-factor authentication explained: Enable two-factor or multi-factor authentication on your important accounts like email or financial accounts. Watch the video to see why you should use multi-factor authentication.

Additional Resources on Information Security