{"id":289,"date":"2021-10-28T13:39:42","date_gmt":"2021-10-28T17:39:42","guid":{"rendered":"https:\/\/blogs.uml.edu\/information-security\/?p=289"},"modified":"2021-10-28T13:39:43","modified_gmt":"2021-10-28T17:39:43","slug":"cybersecurity-awareness-newsletter","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2021\/10\/28\/cybersecurity-awareness-newsletter\/","title":{"rendered":"Cybersecurity Awareness Newsletter"},"content":{"rendered":"\n<h2>October is Cybersecurity Awareness Month 2021, and this year\u2019s theme is \u201cDo your part. #BeCyberSmart.\u201d Our newsletter tells you what to look out for and how to keep yourself and the university safe.<\/h2>\n\n\n\n<div class=\"wp-block-file\"><a href=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2021\/10\/2021CAMNewsletter_20210817.pdf\">Cyber Security Newsletter<\/a><a href=\"https:\/\/blogs.uml.edu\/information-security\/wp-content\/uploads\/sites\/34\/2021\/10\/2021CAMNewsletter_20210817.pdf\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>October is Cybersecurity Awareness Month 2021, and this year\u2019s theme is \u201cDo your part. #BeCyberSmart.\u201d Our newsletter tells you what to look out for and how to keep yourself and the university safe.<\/p>\n","protected":false},"author":273,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/289"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/273"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=289"}],"version-history":[{"count":2,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/289\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/289\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}