{"id":101545,"date":"2016-09-23T15:03:50","date_gmt":"2016-09-23T19:03:50","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=101545"},"modified":"2026-01-13T15:09:06","modified_gmt":"2026-01-13T20:09:06","slug":"security-for-everyone","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/","title":{"rendered":"Security for Everyone"},"content":{"rendered":"<p><strong><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/beyond-email-3-unconventional-phishing\/\">Beyond emails<\/a><\/strong>: 3 Unconventional Phishing Tactics<\/p>\n<p><strong><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/previewing-a-link-on-a-mobile-device\/\">Preview a link on your mobile device<\/a><\/strong> A step by step for preview a link on your mobile device before you click on it. Previewing links allows you to avoid visiting phishy websites!<\/p>\n<p><strong><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/share-sharepoint-files-or-folders\/\">Sharing Files at BU<\/a> <\/strong>A Step by step by step guide for sharing files using SharePoint and One Drive<\/p>\n<p><strong><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/secure-computing\/\">Secure Computing<\/a><\/strong>\u00a0An overview of strategies to handle data and using good computing practices<\/p>\n<p><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/understanding-patches-and-software-updates\/\"><strong>Understanding Patches and Software Updates:<\/strong><\/a><strong> <\/strong>Learn the basics of keeping your device up to date!<\/p>\n<p><strong><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/securing-your-devices\/\">Secure your Devices<\/a><\/strong>\u00a0<span>Learn how to keep your devices secure<\/span><\/p>\n<p><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/phishing\/\"><strong>BU Phishing Guide<\/strong><\/a>\u00a0 Tips for detecting and protecting yourself from phishing scams<\/p>\n<p><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/how-to-identify-and-protect-yourself-from-an-unsafe-website\/\"><strong>Identify and Protect Yourself from Unsafe Websites<\/strong><\/a> Learn what NOT to click on!<\/p>\n<p><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/how-to-fight-identity-theft\/\"><strong>Fight Identity Theft<\/strong><\/a> A great resource for information on how to <em>DETECT<\/em>, <em>DETER<\/em> and <em>DEFEND <\/em>against Identity Theft<\/p>\n<p><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/how-to-lock-your-computer\/\"><strong>Lock Your Computer<\/strong><\/a> If your computer is in an area where other people consider its\u2019 security. By simply locking your computer you reduce risk<\/p>\n<p><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/how-to-create-an-administrator-account\/\"><strong>Create an Administrator Account <\/strong><\/a>Create an admin account on your computer\u00a0 separate from your standard account for a safer machine, this step-by-step will walk you through<\/p>\n<p><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/how-to-choose-a-strong-password\/\"><strong>Choose a Strong Password<\/strong><\/a> Your passwords are the keys to many things: Protect them like you would anything else of physical value. Here are steps for creating strong passwords<\/p>\n<p><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/how-to-safely-dispose-of-your-cell-phone\/\"><strong>Safely Dispose of your Old Cell Phone<\/strong><\/a> Before you trade in your old cell phone, think about all the sensitive data collected after all your usage. Here are some suggestions for wiping your phone before you give it away<\/p>\n<p><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/how-to-manage-spam\/\"><strong>Manage Spam <\/strong><\/a>While some consumers find unsolicited commercial email \u2014 also known as \u201cspam\u201d \u2014 informative, most of us find it annoying and time consuming. Here are tips to avoid spamming<\/p>\n<p><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/shop-and-conduct-other-business-online-safely\/\"><strong>How To Shop Online Safely <\/strong><\/a>Tips on how to shop and conduct business online safely and securely<\/p>\n<p><b><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/how-to-handle-a-virus-infection\/\">How to Handle a Virus Infection<\/a>\u00a0<\/b>If you ever get infected with a virus, here are some helpful tips to help clean up your devices.<\/p>\n<p><strong><a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/how-to-safely-store-your-data-in-the-cloud\/\">Safely Store Your Data in the Cloud<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beyond emails: 3 Unconventional Phishing Tactics Preview a link on your mobile device A step by step for preview a link on your mobile device before you click on it. Previewing links allows you to avoid visiting phishy websites! Sharing Files at BU A Step by step by step guide for sharing files using SharePoint&#8230;<\/p>\n","protected":false},"author":4697,"featured_media":0,"parent":99517,"menu_order":16,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/101545"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/4697"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=101545"}],"version-history":[{"count":36,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/101545\/revisions"}],"predecessor-version":[{"id":160714,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/101545\/revisions\/160714"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/99517"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=101545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}