{"id":10923,"date":"2019-02-20T21:36:05","date_gmt":"2019-02-21T02:36:05","guid":{"rendered":"http:\/\/www.montclair.edu\/information-technology\/?p=10923"},"modified":"2019-03-12T12:38:06","modified_gmt":"2019-03-12T16:38:06","slug":"dare-to-be-aware","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/information-technology\/2019\/02\/20\/dare-to-be-aware\/","title":{"rendered":"Dare to Be Aware"},"content":{"rendered":"<p>Montclair State University is introducing an online cybersecurity awareness training program for all employees. The training consists of about a dozen 3-5 minute videos and will provide users with important information regarding key cybersecurity topics including how to:<\/p>\n<p>\u2022Properly handle and protect electronic data<br \/>\n\u2022Browse the Internet safely<br \/>\n\u2022Understand what malware is<br \/>\n\u2022Recognize phishing email, and<br \/>\n\u2022Practice good password hygiene<\/p>\n<p>The training is self-paced so you can view one or two videos per day in any order you choose. The training was successfully piloted in the Human Resources, Finance and Treasury, Budget, and Facilities divisions and offered to the University Senate members this past fall. More information about the spring semester rollout will be sent to the allusers list within the next few weeks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Montclair State University is introducing an online cybersecurity awareness training program for all employees. The training consists of about a dozen 3-5 minute videos and will provide users with important information regarding key cybersecurity topics including how to: \u2022Properly handle and protect electronic data \u2022Browse the Internet safely \u2022Understand what malware is \u2022Recognize phishing email, [&hellip;]<\/p>\n","protected":false},"author":119,"featured_media":10701,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-10923","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/10923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=10923"}],"version-history":[{"count":1,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/10923\/revisions"}],"predecessor-version":[{"id":10924,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/10923\/revisions\/10924"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media\/10701"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=10923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/categories?post=10923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/tags?post=10923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}