{"id":15,"date":"2013-09-13T17:40:16","date_gmt":"2013-09-13T17:40:16","guid":{"rendered":"http:\/\/westernudev.kinsta.cloud\/computing?page_id=15"},"modified":"2023-01-19T16:36:22","modified_gmt":"2023-01-19T16:36:22","slug":"security","status":"publish","type":"page","link":"https:\/\/westernudev.kinsta.cloud\/computing\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<section class=\"hero-secondary\">\n  <div class=\"relative bg-black\">\n                <img decoding=\"async\" class=\"adhere object-cover\" src=\"\/media\/computing\/images\/att-01.jpg\" srcset=\"\" sizes=\"100vw\" alt=\"WesternU Campus Anderson Town building\">\n      <div class=\"adhere gradient-overlay\"><\/div>\n        <div class=\"relative container pt-56 md:pt-112 pb-144 md:pb-192\">\n      <div class=\"md:flex md:justify-between px-12\">\n        <div class=\"sm:w-8\/12 md:w-6\/12 xl:w-5\/12 px-12\">\n                      <div class=\"mb-20\">\n              <div class=\"block font-sans font-bold text-14 text-white leading-130\">\n  <span class=\"inline-block\">\n    <a href=\"\/\" class=\"block hover:underline\">WesternU<\/a>\n  <\/span>\n      <span class=\"inline-block mx-6\">\/<\/span>\n          <a href=\"https:\/\/westernudev.kinsta.cloud\/computing\" class=\"inline-block hover:underline\">Office of Information Technology<\/a>\n          <span class=\"inline-block mx-6\">\/<\/span>\n    <span class=\"inline-block\">Security<\/span>\n  <\/div>            <\/div>\n                                        <h1 class=\"t-h1-sans  text-white\">Security<\/h1>\n        <\/div>\n              <\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n\n<section class=\"my-48 md:mt-96 md:mb-72\" vue-app>\n  <div class=\"container\">\n    <div class=\"app-gutter\">\n      <div class=\"relative md:flex md:justify-end\">\n        <div class=\"app-gutter\">\n                                  <img decoding=\"async\" class=\"md:absolute md:-top-32 md:left-0 w-full md:w-5\/12 lg:w-6\/12 h-240 sm:h-320 md:h-full object-cover rounded-t-5 md:rounded-8\" src=\"\/media\/computing\/images\/campus-hec-closeup.jpg\" srcset=\"\" sizes=\"(min-width: 768px) 50vw, 100vw\" alt=\"Health Education building looking through windows\">\n                  <\/div>\n        <div class=\"md:w-8\/12 xl:w-7\/12 app-gutter\">\n          <div class=\"p-32 sm:p-40 md:px-0 md:py-80 rounded-b-5 md:rounded-8 bg-black\">\n            <div class=\"md:ml-1\/8 lg:ml-1\/4 xl:ml-1\/7 md:px-40 lg:px-80\">\n                              \t\t\t\t\n<div class=\"text-lockup text-lockup--black\">\n\t<h2>\n\t\t\t\t\t<span class=\"t-h2-serif  block text-yellow\">Cybersecurity<\/span>\n\t\t\t\t\t\t\t<span class=\"t-h2-sans  block text-white\">Information<\/span>\n\t\t\t<\/h2>\n\t\t\t<div class=\"wysiwyg-content t-p2 mt-24 text-white\">For information on Cybersecurity and ways to protect your information, the following Knowledge Base Articles are recommended:<\/div>\n\t\t\t\t\t\t<div class=\"mt-28\">\n\t\t\t<a class=\"cta-arrow cta-arrow--yellow \" href=\"https:\/\/support.westernu.edu\/TDClient\/1848\/Portal\/KB\/ArticleDet?ID=97366\" target=\"_blank\" rel=\"noopener\">\n    Identifying Ransomware<svg class=\"cta-arrow__icon d-block w-16 ml-12\" viewBox=\"0 0 20 16\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><polygon fill=\"currentColor\" points=\"11.3168217 0 9.27266614 2.39591605 14.0042587 6.6137266 8.92524936 6.42314237 0 6.42314237 0 9.57685763 8.92524936 9.57685763 14.0042587 9.3862734 9.19197579 13.6063528 11.3168217 16 20 8\"><\/polygon><\/svg>\n<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"mt-16\">\n\t\t\t<a class=\"cta-arrow cta-arrow--yellow \" href=\"https:\/\/support.westernu.edu\/TDClient\/1848\/Portal\/KB\/ArticleDet?ID=75916\" target=\"_blank\" rel=\"noopener\">\n    Phishing and Name Spoofing<svg class=\"cta-arrow__icon d-block w-16 ml-12\" viewBox=\"0 0 20 16\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><polygon fill=\"currentColor\" points=\"11.3168217 0 9.27266614 2.39591605 14.0042587 6.6137266 8.92524936 6.42314237 0 6.42314237 0 9.57685763 8.92524936 9.57685763 14.0042587 9.3862734 9.19197579 13.6063528 11.3168217 16 20 8\"><\/polygon><\/svg>\n<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"mt-16\">\n\t\t\t<a class=\"cta-arrow cta-arrow--yellow \" href=\"https:\/\/support.westernu.edu\/TDClient\/1848\/Portal\/KB\/ArticleDet?ID=108920\" target=\"_blank\" rel=\"noopener\">\n    Working from Home \u2013 IT Security Best Practices<svg class=\"cta-arrow__icon d-block w-16 ml-12\" viewBox=\"0 0 20 16\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><polygon fill=\"currentColor\" points=\"11.3168217 0 9.27266614 2.39591605 14.0042587 6.6137266 8.92524936 6.42314237 0 6.42314237 0 9.57685763 8.92524936 9.57685763 14.0042587 9.3862734 9.19197579 13.6063528 11.3168217 16 20 8\"><\/polygon><\/svg>\n<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"mt-16\">\n\t\t\t<a class=\"cta-arrow cta-arrow--yellow \" href=\"https:\/\/support.westernu.edu\/TDClient\/1848\/Portal\/KB\/ArticleDet?ID=71333\" target=\"_blank\" rel=\"noopener\">\n    Webpage Addresses \u2013 Identifying Deception<svg class=\"cta-arrow__icon d-block w-16 ml-12\" viewBox=\"0 0 20 16\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><polygon fill=\"currentColor\" points=\"11.3168217 0 9.27266614 2.39591605 14.0042587 6.6137266 8.92524936 6.42314237 0 6.42314237 0 9.57685763 8.92524936 9.57685763 14.0042587 9.3862734 9.19197579 13.6063528 11.3168217 16 20 8\"><\/polygon><\/svg>\n<\/a>\n\t\t<\/div>\n\t\t\t<\/div>\n                          <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n\n\n\n\n\n<section class=\"relative my-48 md:my-72\" vue-app>\n  <div class=\"container\">\n        <app-accordion class=\"px-24 lg:w-4\/5 mx-auto\">\n              <app-accordion-item class=\"accordion-group block leading-1 opt-1\" content-class=\"accordion-group__panel wysiwyg-content\">\n          <template #accordion-trigger=\"{ href, visible, setRef, clickHandler }\">\n            <a :href=\"'#' + href\" \n              :ref=\"setRef\"\n              :class=\"['accordion-group__button scroll-mt-160', {'accordion__trigger_active': visible}]\"\n              @click.stop.prevent=\"clickHandler\"\n            >\n            <span class=\"block py-10\">\n              Identity Theft &#8211; Protecting Yourself\n            <\/span>\n            <span class=\"accordion-group-icon relative flex w-56 h-56 ml-20 justify-center items-center bg-black rounded-full flex-shrink-0\">\n                            <span class=\"w-16 icon-chevron-down\">\n                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><!--!Font Awesome Free 6.6.0 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license\/free Copyright 2024 Fonticons, Inc.--><path d=\"M233.4 406.6c12.5 12.5 32.8 12.5 45.3 0l192-192c12.5-12.5 12.5-32.8 0-45.3s-32.8-12.5-45.3 0L256 338.7 86.6 169.4c-12.5-12.5-32.8-12.5-45.3 0s-12.5 32.8 0 45.3l192 192z\"\/><\/svg>\n              <\/span>\n              <span class=\"w-16 icon-chevron-up\">\n                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><!--!Font Awesome Free 6.6.0 by @fontawesome - https:\/\/fontawesome.com License - https:\/\/fontawesome.com\/license\/free Copyright 2024 Fonticons, Inc.--><path d=\"M233.4 105.4c12.5-12.5 32.8-12.5 45.3 0l192 192c12.5 12.5 12.5 32.8 0 45.3s-32.8 12.5-45.3 0L256 173.3 86.6 342.6c-12.5 12.5-32.8 12.5-45.3 0s-12.5-32.8 0-45.3l192-192z\"\/><\/svg>\n              <\/span>\n                          <\/span>\n            <\/a>\n          <\/template>\n          <template #accordion-content>\n            <p>Safeguarding your personal information is a responsibility WesternU takes very seriously. In addition to strengthening firewalls and intruer detection systems, IT Infrastructure investigates all suspected threats to campus servers and takes immediate action in the event of a security breach. Access to personal information such as Social Security numbers has been restricted to only those with a compelling business need, and such information has been removed from most computer screens and printed reports. Please exercise caution if you are approached by someone who claims to represent Western University of Health Sciences and asks for personal information. Our university will not contact you and ask for your full Social Security number, bank account, or other personal information. If you believe your personal information has been compromised or your identity has been stolen, immediately report it to your local law enforcement agency, creditors, and credit bureaus. Detailed information on the first steps to take is available on the identity theft victim page of the California Office of Privacy Protection Web site. The following links provide useful information for preventing identity theft in the event of a security breach and data exposure.<\/p>\n<ul>\n<li><a href=\"https:\/\/oag.ca.gov\/idtheft\/facts\/how-to-registry\" target=\"_blank\" rel=\"noopener noreferrer\">California Office of the Attorney General. Identity Theft Registry and Tips for Victims\u00a0<\/a>(Also maintains a fraud hotline at (800) 872-MIS-USED.)<\/li>\n<li><a href=\"https:\/\/oag.ca.gov\/idtheft\/first-aid\" target=\"_blank\" rel=\"noopener noreferrer\">California Office of Privacy Protection. Identity Theft Victim\u2019s First Steps and Resources<\/a>. (You can also call them at (866) 785-9663 to report identify theft.)<\/li>\n<li><a href=\"https:\/\/www.ftc.gov\/bcp\/edu\/microsites\/idtheft\/\" target=\"_blank\" rel=\"noopener noreferrer\">Federal Trade Commission\u2019s Identity Theft Site<\/a><\/li>\n<li><a href=\"https:\/\/www2.ed.gov\/about\/offices\/list\/oig\/misused\/idtheft.html\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Department of Education, Office of Inspector General. How Students Can Reduce Their Risk of Identity Theft<\/a><\/li>\n<li><a href=\"https:\/\/www.justice.gov\/criminal\/fraud\/websites\/idtheft.html\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Department of Justice. Identity Theft and Fraud<\/a><\/li>\n<li><a href=\"https:\/\/www.socialsecurity.gov\/pubs\/10064.html\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Social Security Administration. Identity Theft and your Social Security Number<\/a>\u00a0(Also maintains a fraud hotline at (800) 269-0271.)<\/li>\n<li><a href=\"https:\/\/www.idtheftcenter.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Identity Theft Resource Center<\/a><\/li>\n<li><a href=\"https:\/\/www.privacyrights.org\/identity.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Rights Clearing House<\/a><\/li>\n<\/ul>\n<p>You can contact any of the following credit reporting agencies to place a fraud alert on your consumer credit file and order a free copy of your credit report. You need only contact one of these agencies, which will automatically forward the fraud alert to the other two.<\/p>\n<p><a href=\"https:\/\/www.equifax.com\/\" target=\"_blank\" rel=\"noopener\">Equifax<\/a> (888) 766-0008 Consumer Fraud Division P.O. Box 740256 Atlanta, GA 30374<\/p>\n<p><a href=\"https:\/\/www.experian.com\/\" target=\"_blank\" rel=\"noopener\">Experian<\/a> (888) 397-3742 Credit Fraud Center P.O. Box 1017 Allen, TX 75013<\/p>\n<p><a href=\"https:\/\/www.transunion.com\/\" target=\"_blank\" rel=\"noopener\">TransUnion<\/a> (800) 680-7289 Fraud Victim Assistance Department P.O. Box 6790 Fullerton, CA 92834<\/p>\n\n          <\/template>\n        <\/app-accordion-item>\n          <\/app-accordion>\n  <\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-15","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/westernudev.kinsta.cloud\/computing\/wp-json\/wp\/v2\/pages\/15","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/westernudev.kinsta.cloud\/computing\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/westernudev.kinsta.cloud\/computing\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/westernudev.kinsta.cloud\/computing\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/westernudev.kinsta.cloud\/computing\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":20,"href":"https:\/\/westernudev.kinsta.cloud\/computing\/wp-json\/wp\/v2\/pages\/15\/revisions"}],"predecessor-version":[{"id":1606,"href":"https:\/\/westernudev.kinsta.cloud\/computing\/wp-json\/wp\/v2\/pages\/15\/revisions\/1606"}],"wp:attachment":[{"href":"https:\/\/westernudev.kinsta.cloud\/computing\/wp-json\/wp\/v2\/media?parent=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}