  {"id":2,"date":"2020-06-24T15:04:51","date_gmt":"2020-06-24T19:04:51","guid":{"rendered":"http:\/\/www.yorku.ca\/uit-infosecdev\/?page_id=2"},"modified":"2025-10-23T15:05:42","modified_gmt":"2025-10-23T19:05:42","slug":"home","status":"publish","type":"page","link":"https:\/\/www.yorku.ca\/uit\/infosec\/","title":{"rendered":"Information Security"},"content":{"rendered":"\n<div class=\"wp-block-group profile-block top right white\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading mb-0\">Our Commitment<\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group profile-block middle right white\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-image size-large border-md border-primary\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"464\" src=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/10\/york-building-1024x464.png\" alt=\"\" class=\"wp-image-2360\" srcset=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/10\/york-building-1024x464.png 1024w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/10\/york-building-400x181.png 400w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/10\/york-building.png 1480w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"text-primary text-uppercase mb-0\">Our Commitment<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>At 快播视频, we recognize that information security is about more than just defending against cyber threats\u2014it\u2019s about protecting privacy, ensuring responsible data management, and fostering a culture of digital trust.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Explore our resources, best practices, and cybersecurity awareness materials designed to help you navigate the ever-evolving landscape of information security.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<style>.kadence-column2_54f7b7-2d > .kt-inside-inner-col,.kadence-column2_54f7b7-2d > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column2_54f7b7-2d > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column2_54f7b7-2d > .kt-inside-inner-col{flex-direction:column;}.kadence-column2_54f7b7-2d > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column2_54f7b7-2d > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column2_54f7b7-2d{position:relative;}@media all and (max-width: 1024px){.kadence-column2_54f7b7-2d > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column2_54f7b7-2d > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column2_54f7b7-2d\"><div class=\"kt-inside-inner-col\">\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n<\/div><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<style>.kb-advanced-slider-2_4c37f9-b8 .kb-slider-size-fixed .kb-advanced-slide-inner-wrap{min-height:1px;}.kb-advanced-slider-2_4c37f9-b8 .kb-advanced-slide-inner-wrap{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kb-advanced-slider-2_4c37f9-b8 .kb-slider-pause-button{color:#000;background-color:rgba(255, 255, 255, 0.8);border:1px solid transparent;}<\/style><div class=\"kb-advanced-slider kb-advanced-slider-2_4c37f9-b8 carousel-quote wp-block-kadence-slider\"><div class=\"kb-advanced-slider-inner-contain kb-adv-slider-html-version-2\"><div class=\"kb-blocks-advanced-carousel kt-blocks-carousel kt-carousel-container-dotstyle-dark\"><div class=\"kb-blocks-advanced-slider-init kb-slider-loading kb-blocks-slider kt-carousel-arrowstyle-blackonlight kt-carousel-dotstyle-dark kb-slider-size-fixed kb-slider-type-slider kb-slider-ratio-12-5 kb-slider-group-arrow kb-slider-arrow-position-center kb-slider-tab-ratio-inherit kb-slider-mobile-ratio-inherit splide kb-splide  kb-slider-version-2\" aria-label=\"Slider content\" data-slider-center-mode=\"true\" data-slider-type=\"slider\" data-loop-type=\"loop\" data-columns-xxl=\"3\" data-columns-xl=\"3\" data-columns-md=\"3\" data-columns-sm=\"2\" data-columns-xs=\"1\" data-columns-ss=\"1\" data-slider-anim-speed=\"400\" data-slider-scroll=\"1\" data-slider-fade=\"true\" data-slider-arrows=\"true\" data-slider-dots=\"true\" data-slider-hover-pause=\"false\" data-slider-auto=\"false\"  data-dragging=\"true\" data-slider-speed=\"7000\" data-slider-gap=\"30\" data-slider-gap-tablet=\"30\" data-slider-gap-mobile=\"30\" data-slider-gap-unit=\"px\"><div class=\"splide__track\"><ul class=\"splide__list\">\n\n<div class=\"wp-block-kadence-slide kb-advanced-slide-item kb-slide-2_d11a2a-af\"><div class=\"kb-advanced-slide\"><div class=\"kb-advanced-slide-inner-wrap kb-slide-align-left kb-slide-valign-middle\"><div class=\"kb-advanced-slide-inner\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-custom align-left\"><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/report-phishing-email\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/typing-1024x684.jpeg\" alt=\"hand typing on keyboard representing phishing \" class=\"wp-image-710\" srcset=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/typing-1024x684.jpeg 1024w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/typing-400x267.jpeg 400w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/typing-391x260.jpeg 391w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/typing-1536x1025.jpeg 1536w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/typing-2048x1367.jpeg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p class=\"has-text-align-left\">Phishing is a scam in which someone sends you a message trying to get you to open a file, click a link, or follow provided instructions. Their goal is to steal your personal information or money.<\/p>\n\n\n\n<p class=\"has-text-align-left small\"><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/report-phishing-email\/\">Read More about Report Phishing Emails<\/a><\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-slide kb-advanced-slide-item kb-slide-2_83b436-d2\"><div class=\"kb-advanced-slide\"><div class=\"kb-advanced-slide-inner-wrap kb-slide-align-left kb-slide-valign-middle\"><div class=\"kb-advanced-slide-inner\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-custom align-left\"><a href=\"https:\/\/yulearn.yorku.ca\/local\/yulearn\/learning_opportunity.php?id=252\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"627\" src=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/security-protection-anti-virus-software-60504-2.jpeg\" alt=\"\" class=\"wp-image-715\" srcset=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/security-protection-anti-virus-software-60504-2.jpeg 940w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/security-protection-anti-virus-software-60504-2-400x267.jpeg 400w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/security-protection-anti-virus-software-60504-2-391x260.jpeg 391w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p>While York employs a variety of measures to help protect against these threats. The security awareness initiative is intended to help promote and provide helpful resources and training to York community members.<\/p>\n\n\n\n<p class=\"small\"><a href=\"https:\/\/yulearn.yorku.ca\/local\/yulearn\/learning_opportunity.php?id=252\">Read More about Get Cyber Training<\/a><\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-slide kb-advanced-slide-item kb-slide-2_57f35f-0d\"><div class=\"kb-advanced-slide\"><div class=\"kb-advanced-slide-inner-wrap kb-slide-align-left kb-slide-valign-middle\"><div class=\"kb-advanced-slide-inner\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-custom align-left\"><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/three-easy-tips-to-choose-a-strong-password\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/fly-d-63Sg6s3EocE-unsplash-1024x683.jpg\" alt=\"\" class=\"wp-image-719\" srcset=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/fly-d-63Sg6s3EocE-unsplash-1024x683.jpg 1024w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/fly-d-63Sg6s3EocE-unsplash-400x267.jpg 400w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/fly-d-63Sg6s3EocE-unsplash-391x260.jpg 391w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/fly-d-63Sg6s3EocE-unsplash-1536x1025.jpg 1536w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/fly-d-63Sg6s3EocE-unsplash-2048x1366.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p class=\"has-text-align-left\">Technology has gotten better and better, isn't it time to improve the way you handle passwords? Read the links below to help you create a strong password, manage all your passwords in a password manager, and enable two-step verification.<\/p>\n\n\n\n<p class=\"has-text-align-left small\"><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/three-easy-tips-to-choose-a-strong-password\/\">Read More about Use Strong Passwords<\/a><\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div>\n\n<\/ul><\/div><\/div><\/div><\/div><\/div>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-black-color has-white-background-color has-text-color has-background is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wpv-view-output\" data-toolset-views-view-editor=\"4516230f03e3db0b96fc4065bffdc4e7\">\n<div class=\"wp-block-toolset-views-view-editor wpv-gutenberg-view-wrapper-1389\">\n\n\n\n\n<div id=\"wpv-view-layout-1389\" class=\"js-wpv-view-layout js-wpv-layout-responsive js-wpv-view-layout-1389\" data-viewnumber=\"1389\" data-pagination=\"{&quot;id&quot;:&quot;1389&quot;,&quot;query&quot;:&quot;normal&quot;,&quot;type&quot;:&quot;disabled&quot;,&quot;effect&quot;:&quot;fade&quot;,&quot;duration&quot;:500,&quot;speed&quot;:5,&quot;pause_on_hover&quot;:&quot;enabled&quot;,&quot;stop_rollover&quot;:&quot;false&quot;,&quot;cache_pages&quot;:&quot;enabled&quot;,&quot;preload_images&quot;:&quot;enabled&quot;,&quot;preload_pages&quot;:&quot;enabled&quot;,&quot;preload_reach&quot;:1,&quot;spinner&quot;:&quot;builtin&quot;,&quot;spinner_image&quot;:&quot;https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/plugins\/wp-views\/embedded\/res\/img\/ajax-loader.gif&quot;,&quot;callback_next&quot;:&quot;&quot;,&quot;manage_history&quot;:&quot;enabled&quot;,&quot;has_controls_in_form&quot;:&quot;disabled&quot;,&quot;infinite_tolerance&quot;:&quot;0&quot;,&quot;max_pages&quot;:1,&quot;page&quot;:1,&quot;base_permalink&quot;:&quot;\/uit\/infosec\/wp-json\/wp\/v2\/pages\/2?wpv_view_count=1389&amp;wpv_paged=WPV_PAGE_NUM&quot;,&quot;loop&quot;:{&quot;type&quot;:&quot;&quot;,&quot;name&quot;:&quot;&quot;,&quot;data&quot;:[],&quot;id&quot;:0}}\" data-permalink=\"\/uit\/infosec\/wp-json\/wp\/v2\/pages\/2?wpv_view_count=1389\">\n\n\t\n\t\n\t\n\t\t\n\t\t<div class=\"articles section group\">\n\t\t\t<div class=\"col span_1_of_3 mobile_full\"><p>22 April 2026<\/p>\n<p><strong><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/2026\/04\/22\/fake-captcha-real-threat-clickfix-social-engineering-attacks\/\">Fake CAPTCHA, Real Threat: ClickFix Social Engineering Attacks<\/a><\/strong><\/p>\n<p>ClickFix attacks are a rapidly evolving threat that use fake CAPTCHA pages to trick people into running malicious commands (often PowerShell) on their own devices. In every ClickFix case, the attacker relies on one thing: your participation. Most tradition...<\/p><\/div>\n\t\t\n\t\t\n\t\t\t<div class=\"col span_1_of_3 mobile_full\"><p>17 March 2026<\/p>\n<p><strong><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/2026\/03\/17\/phish-alert-malicious-website-impersonating-york-university\/\">Phish Alert - Malicious Website Impersonating 快播视频<\/a><\/strong><\/p>\n<p>The Information Security team has identified a fraudulent website impersonating 快播视频 that is actively attempting to harvest community members' login credentials. This malicious site closely mimics the appearance of official 快播视频 web p...<\/p><\/div>\n\t\t\n\t\t\n\t\t\t<div class=\"col span_1_of_3 mobile_full\"><p>5 January 2026<\/p>\n<p><strong><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/2026\/01\/05\/phish-alert-winter-2026-term-commencement-important-information\/\">Phish Alert - Winter 2026 Term Commencement \u2013 Important Information<\/a><\/strong><\/p>\n<p>The Information Security team has identified a targeted phishing email sent on January 5, 2026 (today) that is being circulated among the 快播视频 community. The email used the subject line equal or similar to \"Winter 2026 Term Commencement \u2013 Import...<\/p><\/div>\n\t\t<\/div>\n\t\t\n\t\n\t\n\t\n<\/div>\n\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button bg-primary-2 text-white rounded-0 learnmore-block p-2\"><a class=\"wp-block-button__link has-white-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.yorku.ca\/uit\/infosec\/category\/announcement\/\" style=\"background-color:#810001\">See all Alerts <i class=\"fas fa-chevron-right small pl-2\"><\/i><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-cover is-light full-width navigation-list\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-vivid-red-background-color has-background-dim-90 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1440\" class=\"wp-block-cover__image-background wp-image-847\" alt=\"\" src=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/7680x4320-light-gray-solid-color-background-scaled.jpg\" style=\"object-position:50% 51%\" data-object-fit=\"cover\" data-object-position=\"50% 51%\" srcset=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/7680x4320-light-gray-solid-color-background-scaled.jpg 2560w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/7680x4320-light-gray-solid-color-background-400x225.jpg 400w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/7680x4320-light-gray-solid-color-background-1024x576.jpg 1024w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/7680x4320-light-gray-solid-color-background-1536x864.jpg 1536w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/7680x4320-light-gray-solid-color-background-2048x1152.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group container pt-4 mt-3\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading has-text-align-center has-very-light-gray-color has-text-color has-link-color wp-elements-250d63e0ffb47269b23663bd5b650ca5\">   <em> <\/em><strong>I want to...<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list list-unstyled\">\n<li><a href=\"https:\/\/www.yorku.ca\/uit\/faculty-staff-services\/your-york-computer\/protecting-your-computing-devices\/antivirus-software\/\">Protect My Devices From Viruses <i class=\"fas fa-arrow-right\"><\/i><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/duo-two-factor-authentication\/\">Access Duo Two Factor Authentication Services <i class=\"fas fa-arrow-right\"><\/i><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/ssl-certificates\/\">Learn About SSL Certificates <i class=\"fas fa-arrow-right\"><\/i><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/password-manager-guide-2\/\">Learn about Password Managers <i class=\"fas fa-arrow-right\"><\/i><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/cybersecurity-best-practices-for-working-remotely\/\">Stay Cyber Secure While Working Remotely <i class=\"fas fa-arrow-right\"><\/i><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/zoom-privacy-and-security\/\">Learn about Zoom Privacy and Security <i class=\"fas fa-arrow-right\"><\/i><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/cyberbullying-and-online-harassment-guide-and-resources\/\">Report Cyberbullying and Online Harassment <i class=\"fas fa-arrow-right\"><\/i><\/a><\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover is-light full-width hovercard-bg\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"2016\" height=\"1344\" class=\"wp-block-cover__image-background wp-image-773\" alt=\"\" src=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/dahdeleh_atrium-1.jpg\" style=\"object-position:55% 48%\" data-object-fit=\"cover\" data-object-position=\"55% 48%\" srcset=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/dahdeleh_atrium-1.jpg 2016w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/dahdeleh_atrium-1-400x267.jpg 400w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/dahdeleh_atrium-1-1024x683.jpg 1024w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/dahdeleh_atrium-1-391x260.jpg 391w, https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2023\/08\/dahdeleh_atrium-1-1536x1024.jpg 1536w\" sizes=\"auto, (max-width: 2016px) 100vw, 2016px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-columns container align-items-stretch is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-center\"><strong>Policies and Guidelines<\/strong><\/h3>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns container align-items-stretch is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-black-color has-text-color\"><a href=\"https:\/\/www.yorku.ca\/secretariat\/policies\/policies\/guidelines-and-procedures-for-account-management\/\"><strong>Account Management<\/strong><\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-black-color has-text-color\"><a href=\"https:\/\/www.yorku.ca\/secretariat\/policies\/policies\/computing-and-information-technology-facilities-senate-policy\/\"><strong>Computing and Information Technology Facilities<\/strong><\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-black-color has-text-color\"><a href=\"https:\/\/www.yorku.ca\/secretariat\/policies\/policies\/information-security-classification-standard\/\"><strong>Information Security Data Classification Standards<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns container align-items-stretch is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-black-color has-text-color\"><a href=\"https:\/\/www.yorku.ca\/secretariat\/policies\/policies\/information-security-policy\/\"><strong>Information Security Policy<\/strong><\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-black-color has-text-color\"><a href=\"https:\/\/www.yorku.ca\/uit\/infosec\/machform-usage-guideline\/\"><strong>Machform Usage Guideline<\/strong><\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-black-color has-text-color\"><a href=\"https:\/\/www.yorku.ca\/secretariat\/policies\/policies\/network-security-and-management-guidelines-and-procedures\/\"><strong>Network Security and Management<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns container align-items-stretch is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-black-color has-text-color\"><a href=\"https:\/\/www.yorku.ca\/secretariat\/policies\/policies\/computing-and-information-technology-facilities-senate-policy\/\"><strong>University Computing and Information Technology Facilities<\/strong><\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-black-color has-text-color\"><a href=\"https:\/\/www.yorku.ca\/secretariat\/policies\/policies\/guidelines-and-procedures-for-use-of-electronic-mail-e-mail\/\"><strong>Use of Electronic Mail (E-mail)<\/strong><\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-black-color has-text-color\"><a href=\"https:\/\/yuoffice.yorku.ca\/privacy-security\/\"><strong>YUOffice Privacy &amp; Security<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns learnmore-block is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<h2 class=\"wp-block-heading has-text-align-left\"><strong>Follow 快播视频's Information Security Activities<\/strong><\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.yorku.ca\/uit\/infosec\/security-blog\/\"><strong>READ OUR SECURITY BLOG<\/strong><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns social-bar-block is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-social-links aligncenter my-2 is-style-default is-layout-flex wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a href=\"https:\/\/www.facebook.com\/yorku.infosec\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-twitter  wp-block-social-link\"><a href=\"https:\/\/twitter.com\/YorkU_Infosec\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1.843,6.29,1.843 c7.547,0,11.675-6.252,11.675-11.675c0-0.178-0.004-0.355-0.012-0.531C20.985,7.47,21.68,6.747,22.23,5.924z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Twitter<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-instagram  wp-block-social-link\"><a href=\"https:\/\/www.instagram.com\/yorku_infosec\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,4.622c2.403,0,2.688,0.009,3.637,0.052c0.877,0.04,1.354,0.187,1.671,0.31c0.42,0.163,0.72,0.358,1.035,0.673 c0.315,0.315,0.51,0.615,0.673,1.035c0.123,0.317,0.27,0.794,0.31,1.671c0.043,0.949,0.052,1.234,0.052,3.637 s-0.009,2.688-0.052,3.637c-0.04,0.877-0.187,1.354-0.31,1.671c-0.163,0.42-0.358,0.72-0.673,1.035 c-0.315,0.315-0.615,0.51-1.035,0.673c-0.317,0.123-0.794,0.27-1.671,0.31c-0.949,0.043-1.233,0.052-3.637,0.052 s-2.688-0.009-3.637-0.052c-0.877-0.04-1.354-0.187-1.671-0.31c-0.42-0.163-0.72-0.358-1.035-0.673 c-0.315-0.315-0.51-0.615-0.673-1.035c-0.123-0.317-0.27-0.794-0.31-1.671C4.631,14.688,4.622,14.403,4.622,12 s0.009-2.688,0.052-3.637c0.04-0.877,0.187-1.354,0.31-1.671c0.163-0.42,0.358-0.72,0.673-1.035 c0.315-0.315,0.615-0.51,1.035-0.673c0.317-0.123,0.794-0.27,1.671-0.31C9.312,4.631,9.597,4.622,12,4.622 M12,3 C9.556,3,9.249,3.01,8.289,3.054C7.331,3.098,6.677,3.25,6.105,3.472C5.513,3.702,5.011,4.01,4.511,4.511 c-0.5,0.5-0.808,1.002-1.038,1.594C3.25,6.677,3.098,7.331,3.054,8.289C3.01,9.249,3,9.556,3,12c0,2.444,0.01,2.751,0.054,3.711 c0.044,0.958,0.196,1.612,0.418,2.185c0.23,0.592,0.538,1.094,1.038,1.594c0.5,0.5,1.002,0.808,1.594,1.038 c0.572,0.222,1.227,0.375,2.185,0.418C9.249,20.99,9.556,21,12,21s2.751-0.01,3.711-0.054c0.958-0.044,1.612-0.196,2.185-0.418 c0.592-0.23,1.094-0.538,1.594-1.038c0.5-0.5,0.808-1.002,1.038-1.594c0.222-0.572,0.375-1.227,0.418-2.185 C20.99,14.751,21,14.444,21,12s-0.01-2.751-0.054-3.711c-0.044-0.958-0.196-1.612-0.418-2.185c-0.23-0.592-0.538-1.094-1.038-1.594 c-0.5-0.5-1.002-0.808-1.594-1.038c-0.572-0.222-1.227-0.375-2.185-0.418C14.751,3.01,14.444,3,12,3L12,3z M12,7.378 c-2.552,0-4.622,2.069-4.622,4.622S9.448,16.622,12,16.622s4.622-2.069,4.622-4.622S14.552,7.378,12,7.378z M12,15 c-1.657,0-3-1.343-3-3s1.343-3,3-3s3,1.343,3,3S13.657,15,12,15z M16.804,6.116c-0.596,0-1.08,0.484-1.08,1.08 s0.484,1.08,1.08,1.08c0.596,0,1.08-0.484,1.08-1.08S17.401,6.116,16.804,6.116z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Instagram<\/span><\/a><\/li>\n\n\n\n\n\n<\/ul>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our Commitment Our Commitment At 快播视频, we recognize that information security is about more than just defending against cyber threats\u2014it\u2019s about protecting privacy, ensuring responsible data management, and fostering a culture of digital trust. Explore our resources, best practices, and cybersecurity awareness materials designed to help you navigate the ever-evolving landscape of information security. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","ngg_post_thumbnail":0,"footnotes":""},"tags":[],"class_list":["post-2","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security - Information Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yorku.ca\/uit\/infosec\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security - Information Security\" \/>\n<meta property=\"og:description\" content=\"Our Commitment Our Commitment At 快播视频, we recognize that information security is about more than just defending against cyber threats\u2014it\u2019s about protecting privacy, ensuring responsible data management, and fostering a culture of digital trust. Explore our resources, best practices, and cybersecurity awareness materials designed to help you navigate the ever-evolving landscape of information security. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yorku.ca\/uit\/infosec\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-23T19:05:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/10\/york-building.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1480\" \/>\n\t<meta property=\"og:image:height\" content=\"670\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\",\"name\":\"Information Security - Information Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/wp-content\\\/uploads\\\/sites\\\/806\\\/2025\\\/10\\\/york-building-1024x464.png\",\"datePublished\":\"2020-06-24T19:04:51+00:00\",\"dateModified\":\"2025-10-23T19:05:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/wp-content\\\/uploads\\\/sites\\\/806\\\/2025\\\/10\\\/york-building.png\",\"contentUrl\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/wp-content\\\/uploads\\\/sites\\\/806\\\/2025\\\/10\\\/york-building.png\",\"width\":1480,\"height\":670},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#website\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\",\"name\":\"Information Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#organization\",\"name\":\"Information Security\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/wp-content\\\/uploads\\\/sites\\\/806\\\/2025\\\/05\\\/Image-4.png\",\"contentUrl\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/wp-content\\\/uploads\\\/sites\\\/806\\\/2025\\\/05\\\/Image-4.png\",\"width\":1024,\"height\":1024,\"caption\":\"Information Security\"},\"image\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/uit\\\/infosec\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security - Information Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yorku.ca\/uit\/infosec\/","og_locale":"en_US","og_type":"article","og_title":"Information Security - Information Security","og_description":"Our Commitment Our Commitment At 快播视频, we recognize that information security is about more than just defending against cyber threats\u2014it\u2019s about protecting privacy, ensuring responsible data management, and fostering a culture of digital trust. Explore our resources, best practices, and cybersecurity awareness materials designed to help you navigate the ever-evolving landscape of information security. [&hellip;]","og_url":"https:\/\/www.yorku.ca\/uit\/infosec\/","og_site_name":"Information Security","article_modified_time":"2025-10-23T19:05:42+00:00","og_image":[{"width":1480,"height":670,"url":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/10\/york-building.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/","url":"https:\/\/www.yorku.ca\/uit\/infosec\/","name":"Information Security - Information Security","isPartOf":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#primaryimage"},"image":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/10\/york-building-1024x464.png","datePublished":"2020-06-24T19:04:51+00:00","dateModified":"2025-10-23T19:05:42+00:00","breadcrumb":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yorku.ca\/uit\/infosec\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#primaryimage","url":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/10\/york-building.png","contentUrl":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/10\/york-building.png","width":1480,"height":670},{"@type":"BreadcrumbList","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yorku.ca\/uit\/infosec\/"},{"@type":"ListItem","position":2,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#website","url":"https:\/\/www.yorku.ca\/uit\/infosec\/","name":"Information Security","description":"","publisher":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yorku.ca\/uit\/infosec\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#organization","name":"Information Security","url":"https:\/\/www.yorku.ca\/uit\/infosec\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#\/schema\/logo\/image\/","url":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/05\/Image-4.png","contentUrl":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-content\/uploads\/sites\/806\/2025\/05\/Image-4.png","width":1024,"height":1024,"caption":"Information Security"},"image":{"@id":"https:\/\/www.yorku.ca\/uit\/infosec\/#\/schema\/logo\/image\/"}}]}},"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"Alice","author_link":"https:\/\/www.yorku.ca\/uit\/infosec\/author\/alicet\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":327,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":2547,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/pages\/2\/revisions\/2547"}],"wp:attachment":[{"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/media?parent=2"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/infosec\/wp-json\/wp\/v2\/tags?post=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}