Information Security at Lesley

Information Security @ Lesley

Lesley University's information security program works to protect the confidentiality, integrity, and availability of the university's information resources. This site provides resources designed to help our constituents minimize risk to information resources with minimal impact on its productive use.

Lesley Security Policies

Lesley University takes the security and privacy of our information and resources seriously. The purpose of these policies is to inform our constituents of our rules and procedures relating to usage, compliance, and security. Our policies can be found at https://lesley.edu/faculty-staff/technology/information-technology/it-policies.

Information Security Breach Procedure

Information security incidents or breaches are events that could have an adverse effect on the confidentiality, integrity, or availability of information resources at Lesley. Resources could be things like data, individual computers, servers, media, and mobile devices, as well as spoken information or paper. Prompt detection and appropriate handling of these security incidents or breaches are necessary to protect the institution’s information and constituents. If you see or hear something that doesn't seem right, email it@lesley.edu.

Video Resources

  • How to avoid phishing scams  Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.  Phishing emails can also try to get money directly, instead of just asking for account information. Learn how to avoid these phishing scams!
  • Security Awareness  (users will need to log in with their Lesley username and password in order to watch the video) Watch our security awareness videos so you have the information you need to protect your data (and Lesley’s data).
  • How to create secure passwords  Learn how to create secure and unique passwords for every website and application that you access….and don’t use the same password everywhere!
  • Two-factor authentication explained  Enable two-factor or multi-factor authentication on your important accounts like email or financial accounts.  Watch the video to see details about why you should use multi-factor authentication.

Additional Resources on Information Security