{"id":66,"date":"2015-10-19T16:02:40","date_gmt":"2015-10-19T20:02:40","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?page_id=66"},"modified":"2017-02-02T14:01:22","modified_gmt":"2017-02-02T19:01:22","slug":"ouch-security-awareness-newsletters","status":"publish","type":"page","link":"https:\/\/blogs.uml.edu\/information-security\/ouch-security-awareness-newsletters\/","title":{"rendered":"Ouch! Security Awareness Newsletters"},"content":{"rendered":"<p>Each month, we will link to the latest SANS Ouch! security newsletter.<\/p>\n<p>These newsletters will focus on specific topics \/ technology that you can use to help protect both the University and your personal cyber footprint.<\/p>\n<p>Click <a href=\"https:\/\/securingthehuman.sans.org\/newsletters\/ouch\/issues\/OUCH-201702_en.pdf\" target=\"_blank\">here<\/a> to access this month&#8217;s newsletter, focusing on <strong><em>STAYING SECURE ON THE ROAD.<br \/>\n<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Each month, we will link to the latest SANS Ouch! security newsletter. These newsletters will focus on specific topics \/ technology that you can use to help protect both the University and your personal cyber footprint. Click here to access &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/ouch-security-awareness-newsletters\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":272,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/pages\/66"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/272"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=66"}],"version-history":[{"count":13,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/pages\/66\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/pages\/66\/revisions\/291"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}