  {"id":572362,"date":"2023-10-31T08:45:23","date_gmt":"2023-10-31T12:45:23","guid":{"rendered":"https:\/\/www.rochester.edu\/newscenter\/?p=572362"},"modified":"2023-10-31T08:45:23","modified_gmt":"2023-10-31T12:45:23","slug":"protect-the-house-safeguard-digital-information-personal-data-572362","status":"publish","type":"post","link":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/","title":{"rendered":"\u2018Protect the House\u2019 to safeguard digital information and personal data"},"content":{"rendered":"<h2 style=\"width: 85%; font-weight: bold; line-height: 135%; margin-bottom: 0.5em;\">University IT provides guidelines and training for safeguarding data and other sensitive information from cybercriminals.<\/h2>\n<p>Building on October as cybersecurity awareness month, University IT is highlighting its \u201cProtect the House\u201d campaign, which provides the \u201cdos and don\u2019ts\u201d of safeguarding sensitive information at the <a href=\"https:\/\/www.rochester.edu\">Ä¢¹½´«Ã½<\/a> every day of the year. <a href=\"https:\/\/tech.rochester.edu\/news-item\/embracing-change-in-a-transforming-digital-landscape\/\">Protect the House<\/a>\u00a0speaks to the responsibilities University community members have to safeguard our at-work information, as well as our personal information, in order to prevent cybercriminals from accessing data contained within the University and UR Medicine affiliates.<\/p>\n<p>\u201cProtecting the University house\u201d requires both:<\/p>\n<ul>\n<li>investments in modern hardware and software to fence off the perimeters, secure University systems and networks, and<\/li>\n<li>a security culture, where each of us recognizes threats like phishing and breaches so we can make smart decisions like using strong passwords and multi-factor authentication.<\/li>\n<\/ul>\n<p>Investing in new digital applications and services in University research, patient care, and academic pursuits without also safeguarding information systems and networks exposes the University to increasing levels of threats from cybercriminals who use increasingly sophisticated tools and methods to take advantage of human mistakes and fears.\u00a0\u00a0Breaches are also costly, both in terms of operational disruptions and financial costs.<\/p>\n<p>\u201cThese transformations are not easy and University leadership is acutely aware that we must balance good security control with the need for efficient access to information,\u201d says Julie Myers, vice president of information technology and chief information officer. \u201cUltimately, the aim of our Protect the House program is to ensure that the right people have the right level of access to the right data and systems at the right time. However, technical solutions cannot do all the work. For us to be successful, we all must embrace changes and take seriously our responsibility to recognize and avoid threats and prevent breaches.\u201d<\/p>\n<figure id=\"attachment_572372\" aria-describedby=\"caption-attachment-572372\" style=\"width: 1000px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-572372 size-full\" src=\"https:\/\/www.rochester.edu\/newscenter\/wp-content\/uploads\/2023\/10\/protect-the-house.png\" alt=\"Illustration of a house and the words &quot;Our Responsibilities to Protect the House&quot; with two columns of action items, one for you (the employee) to do, including using strong passwords and securing devices when not in use, and one for IT, security, and privacy to do, including providing tools and services that help employees do work and updating the IT security and privacy policy.\" width=\"1000\" height=\"563\" srcset=\"https:\/\/www.rochester.edu\/newscenter\/wp-content\/uploads\/2023\/10\/protect-the-house.png 1000w, https:\/\/www.rochester.edu\/newscenter\/wp-content\/uploads\/2023\/10\/protect-the-house-630x355.png 630w, https:\/\/www.rochester.edu\/newscenter\/wp-content\/uploads\/2023\/10\/protect-the-house-768x432.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-572372\" class=\"wp-caption-text\">There are many ways members of the Ä¢¹½´«Ã½ community can help keep data and personal information secure, from using strong passwords to keeping devices updated. (Graphic by Margarita Rincon \/ University IT)<\/figcaption><\/figure>\n<p>When it comes to ensuring a secure information culture, the following employee responsibilities help build a protective digital barrier around important data:<\/p>\n<ul>\n<li>Use strong, secure passwords and phrases. Keep them safe.<\/li>\n<li>Secure devices when not in use\u2014shut them down or log off, and store in a safe place.<\/li>\n<li>Recognize the latest scams and cyberattack techniques.<\/li>\n<li>Use tools and services provided by University IT.<\/li>\n<li>Know your responsibilities and how to protect our information.<\/li>\n<li>Back up data in approved storage areas.<\/li>\n<li>Know what to do if you think data is breached.<\/li>\n<li>Keep devices updated.<\/li>\n<\/ul>\n<p>As a reminder, all University faculty and staff are required complete by December 15 a training in <a href=\"https:\/\/mypath.rochester.edu\/\">MyPath<\/a> called \u201cInformation Security Policy Updates.\u201d It has been assigned to all staff, faculty, contractors, and student employees at the University and its affiliates, and is part of University IT\u2019s bolstered institution-wide information security policies. The training helps to ensure everyone has a clear understanding of expectations, best practices, and responsibilities to keep personal and institutional information secure. It also helps individuals understand different levels of vulnerability and how to mitigate these threats:<\/p>\n<ul>\n<li><strong>High risk:<\/strong> Social Security numbers, financial and bank information, personal health records, and other legally restricted and\/or confidential information<\/li>\n<li><strong>Moderate risk:<\/strong> budgets, organization charts with names, administrative data, research not marked confidential<\/li>\n<li><strong>Low risk:<\/strong> public information available to all members of the University<\/li>\n<\/ul>\n<p>Training take approximately 20 to 30 minutes and hourly employees can do the training during work hours; please work with your supervisors and managers to schedule your online course. <a href=\"mailto:InfosecRiskandCompliance@UR.Rochester.edu\">Email University Information Security Risk and Compliance<\/a> if you have questions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>University IT provides guidelines and training for safeguarding data and other sensitive information from cybercriminals.\u00a0<\/p>\n","protected":false},"author":126,"featured_media":572762,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-572362","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-university-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u2018Protect the House\u2019 to safeguard digital information and personal data<\/title>\n<meta name=\"description\" content=\"The Ä¢¹½´«Ã½&#039;s Protect the House campaign provides IT guidelines for safeguarding sensitive information from cybercriminals.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018Protect the House\u2019 to safeguard digital information and personal data\" \/>\n<meta property=\"og:description\" content=\"The Ä¢¹½´«Ã½&#039;s Protect the House campaign provides IT guidelines for safeguarding sensitive information from cybercriminals.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/\" \/>\n<meta property=\"og:site_name\" content=\"News Center\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-31T12:45:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rochester.edu\/newscenter\/wp-content\/uploads\/2023\/10\/fea-protect-the-house-Jay_Yan_install_011.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1050\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sara Miller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sara Miller\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/protect-the-house-safeguard-digital-information-personal-data-572362\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/protect-the-house-safeguard-digital-information-personal-data-572362\\\/\"},\"author\":{\"name\":\"Sara Miller\",\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/#\\\/schema\\\/person\\\/27e096963bc860db530195ce8e8547f7\"},\"headline\":\"\u2018Protect the House\u2019 to safeguard digital information and personal data\",\"datePublished\":\"2023-10-31T12:45:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/protect-the-house-safeguard-digital-information-personal-data-572362\\\/\"},\"wordCount\":615,\"image\":{\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/protect-the-house-safeguard-digital-information-personal-data-572362\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/fea-protect-the-house-Jay_Yan_install_011.jpg\",\"articleSection\":[\"University News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/protect-the-house-safeguard-digital-information-personal-data-572362\\\/\",\"url\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/protect-the-house-safeguard-digital-information-personal-data-572362\\\/\",\"name\":\"\u2018Protect the House\u2019 to safeguard digital information and personal data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/protect-the-house-safeguard-digital-information-personal-data-572362\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/protect-the-house-safeguard-digital-information-personal-data-572362\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/fea-protect-the-house-Jay_Yan_install_011.jpg\",\"datePublished\":\"2023-10-31T12:45:23+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/#\\\/schema\\\/person\\\/27e096963bc860db530195ce8e8547f7\"},\"description\":\"The Ä¢¹½´«Ã½'s Protect the House campaign provides IT guidelines for safeguarding sensitive information from cybercriminals.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/protect-the-house-safeguard-digital-information-personal-data-572362\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/protect-the-house-safeguard-digital-information-personal-data-572362\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/protect-the-house-safeguard-digital-information-personal-data-572362\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/fea-protect-the-house-Jay_Yan_install_011.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/fea-protect-the-house-Jay_Yan_install_011.jpg\",\"width\":2000,\"height\":1200,\"caption\":\"ON GUARD: With support from University IT, members of the Ä¢¹½´«Ã½ community can take steps to secure important or sensitive data from threats and breaches. (Ä¢¹½´«Ã½ photo \\\/ J. Adam Fenster)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/protect-the-house-safeguard-digital-information-personal-data-572362\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u2018Protect the House\u2019 to safeguard digital information and personal data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/#website\",\"url\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/\",\"name\":\"News Center\",\"description\":\"Ä¢¹½´«Ã½\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/#\\\/schema\\\/person\\\/27e096963bc860db530195ce8e8547f7\",\"name\":\"Sara Miller\",\"url\":\"https:\\\/\\\/www.rochester.edu\\\/newscenter\\\/author\\\/smiller\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u2018Protect the House\u2019 to safeguard digital information and personal data","description":"The Ä¢¹½´«Ã½'s Protect the House campaign provides IT guidelines for safeguarding sensitive information from cybercriminals.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/","og_locale":"en_US","og_type":"article","og_title":"\u2018Protect the House\u2019 to safeguard digital information and personal data","og_description":"The Ä¢¹½´«Ã½'s Protect the House campaign provides IT guidelines for safeguarding sensitive information from cybercriminals.\u00a0","og_url":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/","og_site_name":"News Center","article_published_time":"2023-10-31T12:45:23+00:00","og_image":[{"url":"https:\/\/www.rochester.edu\/newscenter\/wp-content\/uploads\/2023\/10\/fea-protect-the-house-Jay_Yan_install_011.jpg","width":1050,"height":630,"type":"image\/jpeg"}],"author":"Sara Miller","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sara Miller","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/#article","isPartOf":{"@id":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/"},"author":{"name":"Sara Miller","@id":"https:\/\/www.rochester.edu\/newscenter\/#\/schema\/person\/27e096963bc860db530195ce8e8547f7"},"headline":"\u2018Protect the House\u2019 to safeguard digital information and personal data","datePublished":"2023-10-31T12:45:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/"},"wordCount":615,"image":{"@id":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rochester.edu\/newscenter\/wp-content\/uploads\/2023\/10\/fea-protect-the-house-Jay_Yan_install_011.jpg","articleSection":["University News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/","url":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/","name":"\u2018Protect the House\u2019 to safeguard digital information and personal data","isPartOf":{"@id":"https:\/\/www.rochester.edu\/newscenter\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/#primaryimage"},"image":{"@id":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rochester.edu\/newscenter\/wp-content\/uploads\/2023\/10\/fea-protect-the-house-Jay_Yan_install_011.jpg","datePublished":"2023-10-31T12:45:23+00:00","author":{"@id":"https:\/\/www.rochester.edu\/newscenter\/#\/schema\/person\/27e096963bc860db530195ce8e8547f7"},"description":"The Ä¢¹½´«Ã½'s Protect the House campaign provides IT guidelines for safeguarding sensitive information from cybercriminals.\u00a0","breadcrumb":{"@id":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/#primaryimage","url":"https:\/\/www.rochester.edu\/newscenter\/wp-content\/uploads\/2023\/10\/fea-protect-the-house-Jay_Yan_install_011.jpg","contentUrl":"https:\/\/www.rochester.edu\/newscenter\/wp-content\/uploads\/2023\/10\/fea-protect-the-house-Jay_Yan_install_011.jpg","width":2000,"height":1200,"caption":"ON GUARD: With support from University IT, members of the Ä¢¹½´«Ã½ community can take steps to secure important or sensitive data from threats and breaches. (Ä¢¹½´«Ã½ photo \/ J. Adam Fenster)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rochester.edu\/newscenter\/protect-the-house-safeguard-digital-information-personal-data-572362\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rochester.edu\/newscenter\/"},{"@type":"ListItem","position":2,"name":"\u2018Protect the House\u2019 to safeguard digital information and personal data"}]},{"@type":"WebSite","@id":"https:\/\/www.rochester.edu\/newscenter\/#website","url":"https:\/\/www.rochester.edu\/newscenter\/","name":"News Center","description":"Ä¢¹½´«Ã½","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rochester.edu\/newscenter\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.rochester.edu\/newscenter\/#\/schema\/person\/27e096963bc860db530195ce8e8547f7","name":"Sara Miller","url":"https:\/\/www.rochester.edu\/newscenter\/author\/smiller\/"}]}},"_links":{"self":[{"href":"https:\/\/www.rochester.edu\/newscenter\/wp-json\/wp\/v2\/posts\/572362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rochester.edu\/newscenter\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rochester.edu\/newscenter\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rochester.edu\/newscenter\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rochester.edu\/newscenter\/wp-json\/wp\/v2\/comments?post=572362"}],"version-history":[{"count":10,"href":"https:\/\/www.rochester.edu\/newscenter\/wp-json\/wp\/v2\/posts\/572362\/revisions"}],"predecessor-version":[{"id":572792,"href":"https:\/\/www.rochester.edu\/newscenter\/wp-json\/wp\/v2\/posts\/572362\/revisions\/572792"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rochester.edu\/newscenter\/wp-json\/wp\/v2\/media\/572762"}],"wp:attachment":[{"href":"https:\/\/www.rochester.edu\/newscenter\/wp-json\/wp\/v2\/media?parent=572362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rochester.edu\/newscenter\/wp-json\/wp\/v2\/categories?post=572362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rochester.edu\/newscenter\/wp-json\/wp\/v2\/tags?post=572362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}