{"id":7,"date":"2012-10-19T12:30:15","date_gmt":"2012-10-19T16:30:15","guid":{"rendered":"http:\/\/blog.uvm.edu\/whysecurity\/?p=7"},"modified":"2012-10-19T12:30:15","modified_gmt":"2012-10-19T16:30:15","slug":"why-security","status":"publish","type":"post","link":"https:\/\/blog.uvm.edu\/whysecurity\/2012\/10\/19\/why-security\/","title":{"rendered":"&#8220;Why security?&#8221;"},"content":{"rendered":"<p>It&#8217;s the eleventh hour. You&#8217;ve been working on a project for months. Maybe it&#8217;s a grant application. It&#8217;s all coming together: people; facilities; legal; technology. Suddenly, someone steps in and says, <em>&#8220;Wait a minute: Have you considered information security?&#8221;<\/em><\/p>\n<p>Or maybe you have a favorite online service you&#8217;d really like to use to manage some aspect of your UVM life. You already know how to use it; you&#8217;ve already arranged your workflow around it; you need a little technical help to make it work <em>just right<\/em>. Then your tech-savvy helper says, <em>&#8220;I think we should ask the information security people about this&#8230;&#8221;<\/em><\/p>\n<p>UVM&#8217;s Information Security Office and Operations Team are charged with helping <em>all university units<\/em> protect the institution&#8217;s information. It&#8217;s our job to enable all our constituents to make <em>informed decisions<\/em> about technology products, services, and techniques by helping decision makers understand <em>real risks<\/em> to UVM. <em>We&#8217;re not here to say, &#8220;No.&#8221; We&#8217;re here to ask, &#8220;How?&#8221; and then assist you in finding answers.<\/em><\/p>\n<p>On this site, we hope to share our answers to the &#8220;whys&#8221;, and we&#8217;ll probably start with the ones we&#8217;re asked most often. There will almost certainly be other answers, some of them contrary, in many cases. We invite you to engage us directly by sending your comments to <a title=\"iso@uvm.edu\" href=\"mailto:iso@uvm.edu\">iso@uvm.edu<\/a>.<\/p>\n<p>Additionally, if there is a question you would like to see answered here, please email it to\u00a0 <a title=\"iso@uvm.edu\" href=\"mailto:iso@uvm.edu\">iso@uvm.edu<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Cheers,<\/p>\n<p>Sam Hooker, for the Information Security Operations Team<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s the eleventh hour. You&#8217;ve been working on a project for months. Maybe it&#8217;s a grant application. It&#8217;s all coming together: people; facilities; legal; technology. Suddenly, someone steps in and says, &#8220;Wait a minute: Have you considered information security?&#8221; Or maybe you have a favorite online service you&#8217;d really like to use to manage some &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.uvm.edu\/whysecurity\/2012\/10\/19\/why-security\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;&#8220;Why security?&#8221;&#8221;<\/span><\/a><\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45778],"tags":[530],"class_list":["post-7","post","type-post","status-publish","format-standard","hentry","category-purpose","tag-welcome","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Sam","author_link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/sthooker\/"},"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/7","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/comments?post=7"}],"version-history":[{"count":11,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/7\/revisions"}],"predecessor-version":[{"id":18,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/7\/revisions\/18"}],"wp:attachment":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/media?parent=7"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/categories?post=7"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/tags?post=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}