{"id":99656,"date":"2016-07-13T14:11:35","date_gmt":"2016-07-13T18:11:35","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=99656"},"modified":"2024-07-24T13:33:53","modified_gmt":"2024-07-24T17:33:53","slug":"resources","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/support\/information-security\/resources\/","title":{"rendered":"Cybersecurity Resources &#038; Presentations"},"content":{"rendered":"<h3><em><strong>Trainings:\u00a0<\/strong><\/em><\/h3>\n<p><em>The following trainings are self-guided online trainings. If you would like to setup a guided presentation of this training please contact <a href=\"mailto:buinfosec@bu.edu\">buinfosec@bu.edu<\/a><\/em><\/p>\n<p><a href=\"https:\/\/BOSTONUNIVERSITY.sumtotal.host\/core\/pillarRedirect?relyingParty=LM&amp;url=app%2Fmanagement%2FLMS_ActDetails.aspx%3FActivityId%3D42451%26UserMode%3D0\"><span><strong>Information security Awareness: Cybersecurity Foundations<\/strong><\/span><\/a> <span><em>(Terrier eDevelopment course) <\/em>The goal of this training is to empower and equip you with the knowledge necessary to take an active role in the protection and preservation of University data. Security awareness training aims to align our community with Boston University security best practices, reduce risks and incidents, and support one another in our mission of securing our data. This training will take approximately 20-25 minutes to complete.\u00a0<\/span><\/p>\n<p><span><a href=\"https:\/\/bostonuniversity.sumtotal.host\/core\/pillarRedirect?relyingParty=LM&amp;url=app%2Fmanagement%2FLMS_ActDetails.aspx%3FActivityId%3D38957%26UserMode%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Information Security Awareness: Phishing<\/strong><\/a> <em>(Terrier eDevelopment course) <\/em>An interactive phishing training on the Terrier eDevelopment platform (<\/span>estimated training time: 15-20 minutes)<\/p>\n<p><strong><a href=\"https:\/\/www.bu.edu\/tech\/files\/2021\/09\/Phishing-Training-2020-PDF.pptx\">Phishing Training<\/a>\u00a0<\/strong>A self-guided phishing training accessible to students, faculty and staff.<\/p>\n<p><span><strong><a href=\"https:\/\/BOSTONUNIVERSITY.sumtotal.host\/core\/pillarRedirect?relyingParty=LM&amp;url=app%2Fmanagement%2FLMS_ActDetails.aspx%3FActivityId%3D48955%26UserMode%3D0\">Information security Awareness: Data Privacy &amp; Access Management<\/a> <\/strong><em>(Terrier eDevelopment course)<\/em> A short course on Data privacy, Access Management, and a review of the Access to Electronic Information Policy. This training will take approximately 10-15 minutes to complete\u00a0<\/span><\/p>\n<p><span><strong><a href=\"https:\/\/www.bu.edu\/tech\/files\/2021\/10\/Ransomware-Guide-2021.pdf\">Ransomware Guide<\/a> <\/strong>A<\/span><span> guide for learning more about what ransomware is and how to protect yourself.<\/span><\/p>\n<p><strong><a href=\"https:\/\/www.bu.edu\/tech\/files\/2010\/06\/Security-Awareness-Training-Slides.pdf\">BU Security Awareness Presentation<\/a><\/strong> Information at your fingertips: think about everything you use your computer for: banking, shopping, paying your bills, etc. Then consider how much of your personal information is involved in those transactions: social security number, name, address, medical information, etc. Now imagine the amount of personal information, sensitive information, Boston University collects on students, faculty, and staff.<\/p>\n<p><strong><a href=\"http:\/\/www.bu.edu\/compliance\/resources\/information-security-privacy\/training-infosec-basics\/\">Information Security Basics for New Kerberos Accounts<\/a>\u00a0<\/strong>This presentation goes over the importance of keeping data safe at Boston University. It goes over the classification of data and\u00a0general security requirements for classified data.<\/p>\n<h3><em><strong>Resources:\u00a0<\/strong><\/em><\/h3>\n<p><strong><span>BU Cybersecurity 101: <\/span><\/strong>Check out\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/files\/2021\/10\/Boston-University-Security-101.pdf\">Boston University Security 101<\/a>\u00a0a guide for protecting yourself and educating your team on cybersecurity best practices including multifactor authentication.<\/p>\n<p><b>Terrier Cybersecurity Checkup<\/b>: Visit the\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/terrier-cybersecurity-check-up\/\" contenteditable=\"false\" title=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/terrier-cybersecurity-check-up\/\">Terrier Cybersecurity Checkup<\/a>\u00a0and run a checkup on your BU account!<\/p>\n<p><b><span>BU Phish Guide<\/span><\/b><span>: For more information on phishing, including how to spot a phish and related training opportunities, visit our\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/phishing\/\" contenteditable=\"false\" title=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/security-for-everyone\/phishing\/\">BU Phish Guide<\/a>.<\/span><\/p>\n<p><b><span>BU Phish Bowl<\/span><\/b><span>: Check out the\u00a0<a href=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/bus-phish-bowl\/\" contenteditable=\"false\" title=\"https:\/\/www.bu.edu\/tech\/support\/information-security\/bus-phish-bowl\/\">BU Phish Bowl<\/a>\u00a0for the latest emails scams that have been reported by our community. Being vigilant and knowing what is out there will prepare you for when a phish makes its way into your inbox. This website will show you actual (and timely) phishing scams that have made it onto our network so you can identify them and avoid getting hooked!<\/span><\/p>\n<p><strong>Crowdstrike Endpoint Protection <\/strong><a href=\"https:\/\/www.bu.edu\/tech\/services\/cccs\/desktop\/device-security\/endpoint-protection\/\" title=\"https:\/\/www.bu.edu\/tech\/services\/cccs\/desktop\/device-security\/endpoint-protection\/\">Crowdstrike End Point Protection\u00a0<\/a><span>to help protect yourself from ransomware. It\u2019s free of charge for all students, faculty, and staff for their personal laptop or desktop computers. Crowdstrike is the next generation of antivirus protection replacing McAfee.<\/span><\/p>\n<p><strong>InfoSec Quick Reference Guide<\/strong>: The <a href=\"\/tech\/files\/2024\/07\/INFOSEC-QUICK-REFERENCE-GUIDE.pdf\">InfoSec Quick Reference Guide<\/a> is a one-page reference for reporting an incident, reporting a phish, and important online cybersecurity resources. Share it with your team, colleagues, or students!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trainings:\u00a0 The following trainings are self-guided online trainings. If you would like to setup a guided presentation of this training please contact buinfosec@bu.edu Information security Awareness: Cybersecurity Foundations (Terrier eDevelopment course) The goal of this training is to empower and equip you with the knowledge necessary to take an active role in the protection and&#8230;<\/p>\n","protected":false},"author":4697,"featured_media":0,"parent":99517,"menu_order":14,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/99656"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/4697"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=99656"}],"version-history":[{"count":23,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/99656\/revisions"}],"predecessor-version":[{"id":153351,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/99656\/revisions\/153351"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/99517"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=99656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}