  {"id":176,"date":"2023-07-12T15:42:34","date_gmt":"2023-07-12T19:42:34","guid":{"rendered":"https:\/\/www.yorku.ca\/uit\/infosecdev\/?page_id=176"},"modified":"2025-06-03T14:22:26","modified_gmt":"2025-06-03T18:22:26","slug":"researchers","status":"publish","type":"page","link":"https:\/\/www.yorku.ca\/uit\/infosec\/researchers\/","title":{"rendered":"Cyber Security for Researchers"},"content":{"rendered":"\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In recent years, all aspects of human life have become more and more dependent on the internet. This level of growing dependency for all purposes has led to a considerable number of cybercrimes resulting in innovative and dynamic attacks. Universities, in recent years, have not been immune to these incidents and Higher Education (HE) institutions are increasingly prone to cyberattacks as threat actors target the wealth of personal, financial, research and intellectual data universities possess.<\/p>\n\n\n\n<div style=\"height:58px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">ADVICE FOR RESEARCHERS<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/infosec.yorku.ca\/2020\/09\/cyber-security-advice-for-researchers-during-covid-19\/\">Canadian Centre for Cyber Security Advisory<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/infosec.yorku.ca\/2020\/03\/security-awareness-notice-defending-against-covid-19-cyber-scams\/\">Defending Against COVID-19 Cyber Scams<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.science.gc.ca\/eic\/site\/063.nsf\/eng\/h_97955.html\">Safeguarding Your Research - A Canadian Government Led Initiative<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/science.gc.ca\/site\/science\/en\/safeguarding-your-research\/guidelines-and-tools-implement-research-security\/mitigating-your-research-security-risks\">Mitigating Your Research Security Risks<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/infosec.yorku.ca\/files\/2021\/01\/Videoconferencing-Platforms-and-Research-with-Human-Participants-Nov-2020-Guideline-26.pdf?x12764\">Research Ethics Guideline on Videoconferencing Platforms and Research with Human Participants<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/science.gc.ca\/site\/science\/en\/safeguarding-your-research\/guidelines-and-tools-implement-research-security\/mitigating-your-research-security-risks\/what-steps-can-you-take-protect-your-research\">Recommended Steps to Protect Your Research<\/a><\/li>\n<\/ul>\n\n\n\n<div style=\"height:58px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">BEST PRACTICES FOR WORKING REMOTELY<\/h4>\n\n\n\n<p>Adjusting to working from home is new for many of us and one of the changes is that normal cybersecurity protections that apply when working on ¿ì²¥ÊÓÆµ's campuses are no longer protecting you.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/cybersecurity-best-practices-for-working-remotely\/\">How to Keep Your Work Cyber-Secure at Home<\/a><\/li>\n<\/ul>\n\n\n\n<div style=\"height:58px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">WHAT TO DO IN THE EVENT OF THEFT, LOSS OR UNAUTHORIZED USE OF CONFIDENTIAL RESEARCH DATA<\/h4>\n\n\n\n<p>A data security breach occurs when there is a loss or theft of, or other unauthorized access to, sensitive personally identifiable information that could result in the potential compromise of the confidentiality or integrity of data.<\/p>\n\n\n\n<p>Anyone at ¿ì²¥ÊÓÆµ who knows or suspects that their confidential research data has been lost, stolen or used inappropriately is advised to report the incident to\u00a0<a href=\"mailto:infosec@yorku.ca\">infosec@yorku.ca<\/a>\u00a0for immediate assistance.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent years, all aspects of human life have become more and more dependent on the internet. This level of growing dependency for all purposes has led to a considerable number of cybercrimes resulting in innovative and dynamic attacks. Universities, in recent years, have not been immune to these incidents and Higher Education (HE) institutions [&hellip;]<\/p>\n","protected":false},"author":1984,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","ngg_post_thumbnail":0,"footnotes":""},"tags":[],"class_list":["post-176","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security for Researchers - Information Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yorku.ca\/uit\/infosec\/researchers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security for Researchers - Information Security\" \/>\n<meta property=\"og:description\" content=\"In recent years, all aspects of human life have become more and more dependent on the internet. This level of growing dependency for all purposes has led to a considerable number of cybercrimes resulting in innovative and dynamic attacks. Universities, in recent years, have not been immune to these incidents and Higher Education (HE) institutions [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yorku.ca\/uit\/infosec\/researchers\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T18:22:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/researchers\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/researchers\\\/\",\"name\":\"Cyber Security for Researchers - Information Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#website\"},\"datePublished\":\"2023-07-12T19:42:34+00:00\",\"dateModified\":\"2025-06-03T18:22:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/researchers\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/researchers\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/researchers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security for Researchers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#website\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\",\"name\":\"Information Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#organization\",\"name\":\"Information Security\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/wp-content\\\/uploads\\\/sites\\\/806\\\/2025\\\/05\\\/Image-4.png\",\"contentUrl\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/wp-content\\\/uploads\\\/sites\\\/806\\\/2025\\\/05\\\/Image-4.png\",\"width\":1024,\"height\":1024,\"caption\":\"Information Security\"},\"image\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security for Researchers - Information Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yorku.ca\/uit\/infosec\/researchers\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security for Researchers - Information Security","og_description":"In recent years, all aspects of human life have become more and more dependent on the internet. This level of growing dependency for all purposes has led to a considerable number of cybercrimes resulting in innovative and dynamic attacks. Universities, in recent years, have not been immune to these incidents and Higher Education (HE) institutions [&hellip;]","og_url":"https:\/\/www.yorku.ca\/uit\/infosec\/researchers\/","og_site_name":"Information Security","article_modified_time":"2025-06-03T18:22:26+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/researchers\/","url":"https:\/\/www.yorku.ca\/uit\/infosec\/researchers\/","name":"Cyber Security for Researchers - Information Security","isPartOf":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#website"},"datePublished":"2023-07-12T19:42:34+00:00","dateModified":"2025-06-03T18:22:26+00:00","breadcrumb":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/researchers\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yorku.ca\/uit\/infosec\/researchers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/researchers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yorku.ca\/uit\/infosec\/"},{"@type":"ListItem","position":2,"name":"Cyber Security for Researchers"}]},{"@type":"WebSite","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#website","url":"https:\/\/www.yorku.ca\/uit\/infosec\/","name":"Information Security","description":"","publisher":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yorku.ca\/uit\/infosec\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#organization","name":"Information Security","url":"https:\/\/www.yorku.ca\/uit\/infosec\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#\/schema\/logo\/image\/","url":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/05\/Image-4.png","contentUrl":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/05\/Image-4.png","width":1024,"height":1024,"caption":"Information Security"},"image":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#\/schema\/logo\/image\/"}}]}},"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"clara03","author_link":"https:\/\/www.yorku.ca\/uit\/infosec\/author\/clara03\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages\/176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/users\/1984"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/comments?post=176"}],"version-history":[{"count":7,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages\/176\/revisions"}],"predecessor-version":[{"id":1859,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages\/176\/revisions\/1859"}],"wp:attachment":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/media?parent=176"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/tags?post=176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}