{"id":49,"date":"2015-10-05T11:08:44","date_gmt":"2015-10-05T15:08:44","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=49"},"modified":"2015-10-19T12:39:09","modified_gmt":"2015-10-19T16:39:09","slug":"sans-videos-and-newsletters","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2015\/10\/05\/sans-videos-and-newsletters\/","title":{"rendered":"Password Security Video!"},"content":{"rendered":"<p>Check out this <a href=\"https:\/\/www.securingthehuman.org\/resources\/votm\" target=\"_blank\">video<\/a> about <em><strong>passwords<\/strong><\/em> &#8211; probably one of the most critical but overlooked components of managing security.\u00a0 Using a password securely is one of the key steps to ensure that you keep your data private in a connected world.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out this video about passwords &#8211; probably one of the most critical but overlooked components of managing security.\u00a0 Using a password securely is one of the key steps to ensure that you keep your data private in a connected &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2015\/10\/05\/sans-videos-and-newsletters\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":272,"featured_media":43,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/49"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/272"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=49"}],"version-history":[{"count":7,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/49\/revisions"}],"predecessor-version":[{"id":57,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/49\/revisions\/57"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media\/43"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=49"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=49"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=49"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}