{"id":149,"date":"2016-04-07T14:17:38","date_gmt":"2016-04-07T18:17:38","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=149"},"modified":"2016-04-25T17:01:50","modified_gmt":"2016-04-25T21:01:50","slug":"making-digital-spring-cleaning-an-annual-ritual","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2016\/04\/07\/making-digital-spring-cleaning-an-annual-ritual\/","title":{"rendered":"Making &#8220;Digital Spring Cleaning&#8221; an Annual Ritual"},"content":{"rendered":"<p>Last week, the National Cyber Security Alliance (NCSA) and Better Business Bureau (BBB) <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__us1.campaign-2Darchive2.com_-3Fu-3D1cfc376f9f35e50eaea6eb1e0-26id-3Dd1cd4e9f69-26e-3D5968d34733&amp;d=BQMF-g&amp;c=lqHimbpwJeF7VTDNof4ddl8H-RbXeAdbMI2MFE1TXqA&amp;r=zNfrIXx01e2J_fV2yGVS5PjBxugd17LVhUH8ZbvGWbE&amp;m=zS35bPynHeZ8rpe5z62vePcBh9SI3fE2aTfSstkRzOQ&amp;s=5AjuPgqTWidk6X9VXTOTdDQQJD1xckS7VV6R5wyZie0&amp;e=\"><u>announced<\/u><\/a> that they are encouraging consumers to put cybersecurity top of mind by urging them to make digital devices an additional target of their spring cleaning activities. Let&#8217;s encourage students, faculty, staff, family, and friends to make a thorough \u201cdigital spring cleaning\u201d an annual ritual. Internet users can get a fresh start with their online life by keeping all machines clean, purging their online files, enhancing security features and ensuring that their online reputation shines.<\/p>\n<p><!--more--><\/p>\n<p>NCSA has created a simple Digital Spring Cleaning Checklist to help keep everyone organized. The checklist is available to download at \u00a0<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__staysafeonline.org_stay-2Dsafe-2Donline_resources_digital-2Dspring-2Dcleaning-2Dchecklist&amp;d=BQMF-g&amp;c=lqHimbpwJeF7VTDNof4ddl8H-RbXeAdbMI2MFE1TXqA&amp;r=zNfrIXx01e2J_fV2yGVS5PjBxugd17LVhUH8ZbvGWbE&amp;m=zS35bPynHeZ8rpe5z62vePcBh9SI3fE2aTfSstkRzOQ&amp;s=f9S4B1bR0WYF86IidXO986p4vjpdhuZsHqvWnh9sLGA&amp;e=\"><u>https:\/\/staysafeonline.org\/stay-safe-online\/resources\/digital-spring-cleaning-checklist<\/u><\/a><\/p>\n<p>And for those of you on Twitter, we invite you to join @STOPTHNKCONNECT for the next #ChatSTC Twitter Chat: Digital Spring Cleaning \u2013 Clean Up Your Cyber Clutter. It begins <em><strong>today<\/strong><\/em> \u2014 Thursday, April 7 \u2014 at 3 pm EDT\/noon PDT. This chat will discuss ways you can get a fresh start with your online life this spring. Use #ChatSTC to join! @HEISCouncil will be there, too.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week, the National Cyber Security Alliance (NCSA) and Better Business Bureau (BBB) announced that they are encouraging consumers to put cybersecurity top of mind by urging them to make digital devices an additional target of their spring cleaning activities. &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2016\/04\/07\/making-digital-spring-cleaning-an-annual-ritual\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":273,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/149"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/273"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":2,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/149\/revisions"}],"predecessor-version":[{"id":154,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/149\/revisions\/154"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}