{"id":99517,"date":"2016-06-14T11:12:26","date_gmt":"2016-06-14T15:12:26","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=99517"},"modified":"2026-02-10T16:35:18","modified_gmt":"2026-02-10T21:35:18","slug":"information-security","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/support\/information-security\/","title":{"rendered":"BU Information Security"},"content":{"rendered":"<div class='clearfix support-row'><div class='support-block'><div><h2><span class=\"orange-circle\"><span class=\"tw android\"><span class=\"ss-icon tw\" aria-hidden=\"true\" data-icon=\"&#xe68b;\"><\/span><\/span><\/span> Cybersecurity Resources<\/h2><ul>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/beyond-email-3-unconventional-phishing\/' class=''>Beyond Email: 3 Unconventional Phishing Tactics to Watch out for<\/a><\/h3><\/li>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/terrier-cybersecurity-check-up\/' class=''>Terrier Cybersecurity Checkup<\/a><\/h3><\/li>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/bus-phish-bowl\/' class=''>BU's Phish Bowl<\/a><\/h3><\/li>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/resources\/' class=''>Cybersecurity Resources &amp; Presentations<\/a><\/h3><\/li>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/phishing\/' class=''>BU Phishing Guide<\/a><\/h3><\/li>\n<\/ul><\/div><\/div>\n<div class='support-block'><div><h2><span class=\"orange-circle\"><span class=\"tw quote-left\"><span class=\"ss-icon tw\" aria-hidden=\"true\" data-icon=\"&#xe671;\"><\/span><\/span><\/span> Cybersecurity Awareness<\/h2><ul><li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/cam\/' class=''>Cybersecurity Awareness Month<\/a><\/h3><\/li><li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/cam\/llm-ethics-with-professor-kevin-gold\/' class=''>Ethics &amp; LLMs: Professor Kevin Gold<\/a><\/h3><\/li><li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/information-security-hero-program\/' class=''>Security Hero Program<\/a><\/h3><\/li><li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/data-privacy-day-2021\/' class=''>Data Privacy Day<\/a><\/h3><\/li>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/world-password-day\/' class=''>World Password Day<\/a><\/h3><\/li>\n<\/ul><\/div><\/div><\/div>\n<p><div class='clearfix support-row'><div class='support-block'><div><h2><span class=\"orange-circle\"><span class=\"tw folder\"><span class=\"ss-icon tw\" aria-hidden=\"true\" data-icon=\"&#xe016;\"><\/span><\/span><\/span> Documentation and Guides<\/h2><ul>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/docs\/dsaanddatatrustee\/' class=''>Resources for DSAs &amp; Data Trustees<\/a><\/h3><\/li>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/about\/security-resources\/bestpractice\/' class=''>Best Practices for IT Professionals<\/a><\/h3><\/li>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/docs\/iam-faqs\/' class=''>IAM FAQs<\/a><\/h3><\/li>\n<\/ul><\/div><\/div><\/span><\/p>\n<div class='support-block'><div><h2><span class=\"orange-circle\"><span class=\"tw lightbulb\"><span class=\"ss-icon tw\" aria-hidden=\"true\" data-icon=\"&#xe665;\"><\/span><\/span><\/span> Security for Everyone<\/h2><ul>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/' class=''>Security How Tos<\/a><\/h3><\/li>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-researchers\/' class=''>Security for Researchers<\/a><\/h3><\/li>\n<\/ul><\/div><\/div><\/div>\n<div class='clearfix support-row'><div class='support-block'><div><h2><span class=\"orange-circle\"><span class=\"tw quote-left\"><span class=\"ss-icon tw\" aria-hidden=\"true\" data-icon=\"&#xe671;\"><\/span><\/span><\/span> Policies and Standards<\/h2><ul>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/policies\/' class=''>University Policies<\/a><\/h3><\/li>\n<li class=\"\"><h3><a href='https:\/\/www.bu.edu\/tech\/about\/policies\/#IS&amp;T_Policies' class=''>IS&amp;T Policies<\/a><\/h3><\/li>\n<\/ul><\/div><\/div>\n<div class='support-block'><div><h2><span class=\"orange-circle\"><span class=\"tw info-sign\"><span class=\"ss-icon tw\" aria-hidden=\"true\" data-icon=\"&#xe626;\"><\/span><\/span><\/span> Request InfoSec Services<\/h2><ul>\n<li class=\"\"><h3><a href='http:\/\/www.bu.edu\/help\/tech\/security' class=''>Send Us a Service Request<\/a><\/h3><p>Request an SSL certificate and more<\/p><\/li>\n<\/ul><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>this is an excerpt&#8230;<\/p>\n","protected":false},"author":1301,"featured_media":0,"parent":74764,"menu_order":31,"comment_status":"closed","ping_status":"closed","template":"page-supportlanding.php","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/99517"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/1301"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=99517"}],"version-history":[{"count":53,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/99517\/revisions"}],"predecessor-version":[{"id":160973,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/99517\/revisions\/160973"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/74764"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=99517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}