Lesley University's information security program works to protect the confidentiality, integrity, and availability of the university's information resources. This page provides resources designed to help our constituents minimize risk to information resources with minimal impact on its productive use.
Lesley Security Policies
At Lesley, we take the security and privacy of our information and resources seriously. The purpose of these policies is to inform our constituents of our rules and procedures relating to usage, compliance, and security. Review our policies here.
Information Security Breach Procedure
Information security incidents or breaches could have an adverse effect on the confidentiality, integrity, or availability of information resources at Lesley. Resources could be data, individual computers, servers, media, and mobile devices, as well as spoken information or paper. Prompt detection and appropriate handling of these security incidents or breaches are necessary to protect the institution’s information and constituents. If you see or hear something that doesn't seem right, email firstname.lastname@example.org.
Remote Work Security Resources
- How to avoid phishing scams: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing emails can also try to get money directly, instead of just asking for account information. Learn how to avoid these phishing scams.
- Security Awareness: Log in with their Lesley username and password to watch the video. Watch our security awareness videos so you have the information you need to protect your data (and Lesley’s data).
- How to create secure passwords: Learn how to create secure and unique passwords for every website and application that you access. And don’t use the same password everywhere!
- Two-factor authentication explained: Enable two-factor or multi-factor authentication on your important accounts like email or financial accounts. Watch the video to see why you should use multi-factor authentication.
Additional Resources on Information Security
- Check out Lesley’s information security best practices
- Top FIVE steps to securely work from home
- For tips and tricks on protecting yourself from online dangers, check out the IT support site, and follow IT on Facebook and Twitter
- The FTC & StaySafeOnline.org have great resources to help you (and people you know) use the Internet securely
- Check out examples of Phishing emails