{"id":210,"date":"2016-09-29T08:51:08","date_gmt":"2016-09-29T12:51:08","guid":{"rendered":"http:\/\/sites.scranton.edu\/itmatters\/?p=210"},"modified":"2016-10-11T15:27:04","modified_gmt":"2016-10-11T19:27:04","slug":"information-security-office-information","status":"publish","type":"post","link":"https:\/\/sites.scranton.edu\/itmatters\/2016\/09\/29\/information-security-office-information\/","title":{"rendered":"Information Security Office"},"content":{"rendered":"<p><strong>What is cybersecurity?<img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-211\" src=\"http:\/\/sites.scranton.edu\/itmatters\/files\/2016\/09\/security-300x209.png\" alt=\"security\" width=\"300\" height=\"209\" srcset=\"https:\/\/sites.scranton.edu\/itmatters\/files\/2016\/09\/security-300x209.png 300w, https:\/\/sites.scranton.edu\/itmatters\/files\/2016\/09\/security.png 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/strong><br \/>\nEveryone has a role in securing their part of cyberspace. Individual actions have a collective impact and when we use the internet safely, we make it more secure for everyone. Cybersecurity focuses on protecting computers, networks, programs and data, from unintended or unauthorized access, change or destruction.<br \/>\nOver the next few weeks, we will be providing you with valuable information to help you protect yourself and the University from increasing threats.<\/p>\n<p><strong>Who manages cybersecurity at the University?<\/strong><br \/>\nThe Information Security Office serves as the University\u2019s resource for guidance on information security compliance. The office oversees information security policies, procedures and standards that ensure the confidentiality, integrity, and availability of University data and information.<br \/>\nIn addition to coordinating University response to security incidents and security policy violations, they take a proactive stance by promoting a safe computing environment through security awareness events and training, such as the annual SANS security awareness program, Data Privacy Day and National Cyber Security Awareness Month.<\/p>\n<p><strong>What services does the provide to departments?<\/strong><br \/>\nIn addition to providing technology solutions to protect the University\u2019s information assets, they also offer security services such as consulting, auditing, contract review and policy interpretation to the campus community.<\/p>\n<p><strong>How do I contact the Information Security Office?<\/strong><br \/>\nFor consultation or to report a security incident, you can reach the Information Security Office at 570-941-4226 or email infosec@scranton.edu.<br \/>\nReview the University\u2019s security policies and guidelines at <a href=\"http:\/\/www.scranton.edu\/itpolicies\" target=\"_blank\">http:\/\/www.scranton.edu\/itpolicies<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is cybersecurity? Everyone has a role in securing their part of cyberspace. Individual actions have a collective impact and when we use the internet safely, we make it more secure for everyone. Cybersecurity focuses on protecting computers, networks, programs and data, from unintended or unauthorized access, change or destruction. Over the next few weeks, [&hellip;]<\/p>\n","protected":false},"author":258,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35,46],"tags":[47],"class_list":["post-210","post","type-post","status-publish","format-standard","hentry","category-it-news","category-security","tag-it-security"],"_links":{"self":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts\/210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/users\/258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":2,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts\/210\/revisions"}],"predecessor-version":[{"id":214,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts\/210\/revisions\/214"}],"wp:attachment":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/media?parent=210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/categories?post=210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/tags?post=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}