National Cybersecurity Awareness Month 2017: October 2-6, 2017

ISAWday5

Highlights of Security Awareness Week

We covered several topics this week aimed at increasing security awareness and illustrating best practices. We hope you’ll use this information to be good custodians to your own information as well as any information you collect on behalf of the University.  We encourage you to engage Information Security (buinfosec@bu.edu) with any questions you may have and please visit our web pages for more information!

  • Protect Your Devices

It’s important to make sure that all of your devices (computers, tablets, phones) are properly secured.  Keeping your devices up to date and secured should be your first step at protecting your data and systems from being compromised.  More information on securing your devices can be found here.

  • Protect Your On-Line Identity

It is critical to learn how to protect yourself and guard your privacy. As we routinely see with companies having major data breaches (Equifax being the latest in a long list), your identity and even your personal information is out there, and could be at risk. Visit our site here for tips on keeping your online identity safe.

  • Don’t fall for phishing emails

Phishing is one of the most common methods used for stealing your authorization credentials or infecting your computer.  There are several tips to help you spot, and avoid, phishing emails documented here

  • Data Classification and Protection

The first step to making sure you are properly handing University data is to know how the data is classified.  At BU, data is classified into four categories: Public, Internal, Confidential, and Restricted Use.  Each category has its own set of criteria for how data can be used, stored, and shared.  The University’s Data Classification Policy will help you easily identify the categories of University data in your possession.

Once you know the data’s classification, you can review the Data Protection Requirements and Minimum Security Standards to learn how you are expected to secure it.

Think of your own personal data in the same context and keep your most sensitive data private and secured.