{"id":35,"date":"2015-10-06T15:06:50","date_gmt":"2015-10-06T20:06:50","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=35"},"modified":"2015-10-22T16:13:30","modified_gmt":"2015-10-22T20:13:30","slug":"top-10-ways-to-keep-your-information-and-data-safe","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2015\/10\/06\/top-10-ways-to-keep-your-information-and-data-safe\/","title":{"rendered":"Top 10 Ways to Keep Your Information and Data Safe!"},"content":{"rendered":"<p><iframe loading=\"lazy\" width=\"584\" height=\"329\" src=\"https:\/\/www.youtube.com\/embed\/TAoeNxZCeqQ?feature=oembed\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n<p>Steven couldn\u2019t wait for his first year at college. But what he didn\u2019t know was how a simple list could protect him from a world of hurt!<\/p>\n<p>Follow the top ten ways to keep your information and data safe online, and avoid Steven\u2019s mistakes.<\/p>\n<p>1) Install the University&#8217;s free antivirus software<br \/>\n2) Create strong passwords<br \/>\n3) Be Careful what you store online<br \/>\n4) Limit your public online presence<br \/>\n5) Lock or log off unattended devices<br \/>\n6)\u00a0Keep your devices updates<br \/>\n7)\u00a0Regularly check your online accounts<br \/>\n8) Be\u00a0aware of\u00a0phishing scams<br \/>\n9)\u00a0Download files legally<br \/>\n10) Secure your mobile devices<\/p>\n<p>For more information, visit:<\/p>\n<p>http:\/\/www.uml.edu\/IT\/Services\/IT-Security<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Steven couldn\u2019t wait for his first year at college. But what he didn\u2019t know was how a simple list could protect him from a world of hurt! Follow the top ten ways to keep your information and data safe online, &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2015\/10\/06\/top-10-ways-to-keep-your-information-and-data-safe\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":272,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3,1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/35"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/272"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":3,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/35\/revisions"}],"predecessor-version":[{"id":88,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/35\/revisions\/88"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=35"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=35"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}