{"id":42241,"date":"2023-10-01T08:00:00","date_gmt":"2023-10-01T12:00:00","guid":{"rendered":"https:\/\/inside.wooster.edu\/technology\/?p=42241"},"modified":"2023-10-06T09:55:22","modified_gmt":"2023-10-06T13:55:22","slug":"cybersecurity-awareness-month-2023","status":"publish","type":"post","link":"https:\/\/inside.wooster.edu\/technology\/cybersecurity-awareness-month-2023\/","title":{"rendered":"Cybersecurity Awareness Month 2023"},"content":{"rendered":"\n<p>Welcome to the 20th Cybersecurity Awareness Month this October! <\/p>\n\n\n\n<p>According to the Cybersecurity and Infrastructure Security Agency (CISA), since 2004, the President of the United States and Congress have declared the month of October to be Cybersecurity Awareness Month. A dedicated month for the public and private sectors, and tribal communities to work together to raise awareness about the importance of cybersecurity.<\/p>\n\n\n\n<p>CISA recognizes the top 4 tips that you can implement to keep your tech secured and prevent risks and breaches all year round:<\/p>\n\n\n<h3 class=\"wp-block-heading has-white-color has-vivid-red-background-color has-text-color has-background\" style=\"margin-right:0;margin-left:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\" id=\"using-strong-passwords\">Using Strong Passwords<\/h3>\n\n\n<div style=\"height:43px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:39% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/October-9-Strong-Passwords-3-1-1024x1024.png\" alt=\"\" class=\"wp-image-42252 size-full\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/October-9-Strong-Passwords-3-1-1024x1024.png 1024w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/October-9-Strong-Passwords-3-1-500x500.png 500w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/October-9-Strong-Passwords-3-1-150x150.png 150w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/October-9-Strong-Passwords-3-1-768x768.png 768w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/October-9-Strong-Passwords-3-1.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p style=\"padding-top:0;padding-bottom:0\">Strong passwords are critical to protecting data. They are long, random, unique, and include all four-character types (uppercase, lowercase, numbers, and symbols). Password managers are a powerful tool to help you create long, random, and unique passwords for each of your accounts. Plus, they make storing passwords and user IDs easy.<\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Cybersecurity-Awareness-Month-2023-1-1024x576.png\" alt=\"\" class=\"wp-image-42276\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Cybersecurity-Awareness-Month-2023-1-1024x576.png 1024w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Cybersecurity-Awareness-Month-2023-1-750x422.png 750w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Cybersecurity-Awareness-Month-2023-1-768x432.png 768w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Cybersecurity-Awareness-Month-2023-1-1536x864.png 1536w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Cybersecurity-Awareness-Month-2023-1.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:53px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<h3 class=\"wp-block-heading has-white-color has-vivid-red-background-color has-text-color has-background\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\" id=\"utilizing-multifactor-authentication-mfa\">Utilizing Multifactor Authentication (MFA)<\/h3>\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Oct-19-Multifactor-Authentication-1024x1024.png\" alt=\"\" class=\"wp-image-42270 size-full\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Oct-19-Multifactor-Authentication-1024x1024.png 1024w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Oct-19-Multifactor-Authentication-500x500.png 500w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Oct-19-Multifactor-Authentication-150x150.png 150w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Oct-19-Multifactor-Authentication-768x768.png 768w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Oct-19-Multifactor-Authentication.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>You need more than a password to protect your online accounts and enabling MFA makes you significantly less likely to get hacked. Enable multifactor authentication on all your online accounts that offer it, especially email, social media, and financial accounts and use authentication apps or hardware tokens for added security.<\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\" id=\"mfa-at-wooster\">MFA at Wooster<\/h4>\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 30%\"><div class=\"wp-block-media-text__content\">\n<p>Microsoft offers us a few options for our second factor:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>text message token<\/li>\n\n\n\n<li>phone call token<\/li>\n\n\n\n<li>authenticator app, available for iOS and Android devices<\/li>\n<\/ul>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"220\" height=\"166\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2022\/08\/mfa.png\" alt=\"\" class=\"wp-image-26305 size-full\" \/><\/figure><\/div>\n\n\n\n<p><strong>Information and Planning strongly encourages everyone to <a href=\"https:\/\/inside.wooster.edu\/technology\/knowledge-base\/multi-factor-authentication\/\" data-type=\"link\" data-id=\"https:\/\/inside.wooster.edu\/technology\/knowledge-base\/multi-factor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">setup the authenticator application<\/a> as one of the MFA options.&nbsp; This will allow access via your mobile device when Wi-Fi is available, but phone service is not.&nbsp;<\/strong>This option is especially important while traveling in areas without cellular access.<\/p>\n\n\n\n<p><strong>*Please set-up as many ways to authenticate as you can.<\/strong><\/p>\n\n\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<h3 class=\"wp-block-heading has-white-color has-vivid-red-background-color has-text-color has-background\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\" id=\"recognize-and-reporting-phishing\">Recognize and Reporting Phishing<\/h3>\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Oct-24-Phishing-and-info-security-1024x1024.png\" alt=\"\" class=\"wp-image-42271 size-full\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Oct-24-Phishing-and-info-security-1024x1024.png 1024w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Oct-24-Phishing-and-info-security-500x500.png 500w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Oct-24-Phishing-and-info-security-150x150.png 150w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Oct-24-Phishing-and-info-security-768x768.png 768w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Oct-24-Phishing-and-info-security.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Phishing emails, texts, and calls are the number one way data gets compromised. Be cautious of unsolicited emails, texts or calls asking for personal information. Avoid sharing sensitive information or credentials over the phone or email and don\u2019t click on links or open attachments sent from unknown sources. Verify the authenticity of requests by contacting the individual or organization through a trusted channel. <\/p>\n<\/div><\/div>\n\n\n\n<p>Be sure that you know the <a rel=\"noreferrer noopener\" href=\"https:\/\/inside.wooster.edu\/technology\/fundamentals-for-shoring-up-phising-defenses\/\" target=\"_blank\">markers of a phishing campaign<\/a>, and keep your <a rel=\"noreferrer noopener\" href=\"https:\/\/inside.wooster.edu\/technology\/internet-and-email-safety\/\" target=\"_blank\">Email safe<\/a>!<\/p>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-kadence-accordion alignnone\"><div class=\"kt-accordion-wrap kt-accordion-id42241_21e56f-35 kt-accordion-has-2-panes kt-active-pane-0 kt-accordion-block kt-pane-header-alignment-left kt-accodion-icon-style-basic kt-accodion-icon-side-right\" style=\"max-width:none\"><div class=\"kt-accordion-inner-wrap\" data-allow-multiple-open=\"false\" data-start-open=\"0\">\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-1 kt-pane42241_066483-ba\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Reporting Phishing Emails<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-d2a8f814 wp-block-columns-is-layout-flex\" style=\"padding-top:0;padding-bottom:0\">\n<div class=\"wp-block-column is-layout-constrained wp-container-core-column-is-layout-520232fb wp-block-column-is-layout-constrained\" style=\"padding-right:0;padding-left:0;flex-basis:50%\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Report-Phishing.png\" alt=\"\" class=\"wp-image-42254\" style=\"width:326px;height:257px\" width=\"326\" height=\"257\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Report-Phishing-browser-e1695935736306.png\" alt=\"\" class=\"wp-image-42255\" style=\"width:327px;height:165px\" width=\"327\" height=\"165\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">To report phishing attempts in your college email:<\/p>\n\n\n\n<p style=\"margin-top:var(--wp--preset--spacing--20);margin-right:0;margin-bottom:var(--wp--preset--spacing--20);margin-left:0\">Regardless if you&#8217;re in the desktop application or web browser version of Outlook, the top bar will show a &#8220;report button&#8221; <\/p>\n\n\n\n<p style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-bottom:0\">For Desktop users, you might see &#8220;report message&#8221; and then click &#8220;phishing&#8221; or &#8220;Report phishing&#8221; right in the top bar. <\/p>\n\n\n\n<p style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0\">Web  browser users, you&#8217;ll see a &#8220;report button on left side of your top bar.<\/p>\n<\/div>\n<\/div>\n\n\n\n<p>You&#8217;ll need to Click the &#8220;report&#8221; button in the pop-up confirmation that appears. You may receive an email that your &#8220;sent email&#8221; contained sensitive information, this is a normal part of the data protections in the College of Wooster email system, and can be deleted or ignored.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"384\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/report-as-phishing-e1695936004776-1024x384.png\" alt=\"\" class=\"wp-image-42256\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/report-as-phishing-e1695936004776-1024x384.png 1024w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/report-as-phishing-e1695936004776-750x281.png 750w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/report-as-phishing-e1695936004776-768x288.png 768w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/report-as-phishing-e1695936004776.png 1141w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1015\" height=\"349\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/User-Submission-phishing-email.png\" alt=\"\" class=\"wp-image-42257\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/User-Submission-phishing-email.png 1015w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/User-Submission-phishing-email-750x258.png 750w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/User-Submission-phishing-email-768x264.png 768w\" sizes=\"auto, (max-width: 1015px) 100vw, 1015px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div style=\"height:54px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<h3 class=\"wp-block-heading has-white-color has-vivid-red-background-color has-text-color has-background\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\" id=\"update-software\">Update Software<\/h3>\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Not-being-posted-created-for-Inside-1024x1024.png\" alt=\"\" class=\"wp-image-42272 size-full\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Not-being-posted-created-for-Inside-1024x1024.png 1024w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Not-being-posted-created-for-Inside-500x500.png 500w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Not-being-posted-created-for-Inside-150x150.png 150w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Not-being-posted-created-for-Inside-768x768.png 768w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Not-being-posted-created-for-Inside.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Ensuring your software is up to date is the best way to make sure you have the latest security patches and updates on your devices. Regularly check manually for updates if automatic updates are not available and keep operating systems, antivirus software, web browsers, and applications up to date.<\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:114px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image alignfull size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Cybersecurity-Awareness-Month-2023-1024x576.png\" alt=\"Laptop covered in cobwebs with a ghost coming out. Text saying to stay safe online with puns about cybersecurity safety.\" class=\"wp-image-42269\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Cybersecurity-Awareness-Month-2023-1024x576.png 1024w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Cybersecurity-Awareness-Month-2023-750x422.png 750w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Cybersecurity-Awareness-Month-2023-768x432.png 768w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Cybersecurity-Awareness-Month-2023-1536x864.png 1536w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Cybersecurity-Awareness-Month-2023.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the 20th Cybersecurity Awareness Month this October! According to the Cybersecurity and Infrastructure Security Agency (CISA), since 2004, the President of the United States and Congress have declared the month of October to be Cybersecurity Awareness Month. A dedicated month for the public and private sectors, and tribal communities to work together to [&hellip;]<\/p>\n","protected":false},"author":328,"featured_media":42268,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[12,34],"tags":[],"coauthors":[435],"class_list":["post-42241","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-news"],"acf":[],"gutentor_comment":0,"featured_image_urls":{"full":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51.png",6912,3456,false],"thumbnail":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51-150x150.png",150,150,true],"medium":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51-750x375.png",750,375,true],"medium_large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51-768x384.png",768,384,true],"large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51-1024x512.png",1024,512,true],"1536x1536":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51-1536x768.png",1536,768,true],"2048x2048":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51-2048x1024.png",2048,1024,true]},"post_excerpt_stackable":"<p>Welcome to the 20th Cybersecurity Awareness Month this October! According to the Cybersecurity and Infrastructure Security Agency (CISA), since 2004, the President of the United States and Congress have declared the month of October to be Cybersecurity Awareness Month. A dedicated month for the public and private sectors, and tribal communities to work together to raise awareness about the importance of cybersecurity. CISA recognizes the top 4 tips that you can implement to keep your tech secured and prevent risks and breaches all year round: Using Strong Passwords Strong passwords are critical to protecting data. They are long, random, unique,&hellip;<\/p>\n","category_list":"<a href=\"https:\/\/inside.wooster.edu\/technology\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/inside.wooster.edu\/technology\/category\/news\/\" rel=\"category tag\">News<\/a>","author_info":{"name":"Caitlyn Deeter","url":"https:\/\/inside.wooster.edu\/technology\/author\/cdeeterwooster-edu\/"},"comments_num":"0 comments","uagb_featured_image_src":{"full":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51.png",6912,3456,false],"thumbnail":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51-150x150.png",150,150,true],"medium":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51-750x375.png",750,375,true],"medium_large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51-768x384.png",768,384,true],"large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51-1024x512.png",1024,512,true],"1536x1536":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51-1536x768.png",1536,768,true],"2048x2048":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2023\/09\/Untitled-design-51-2048x1024.png",2048,1024,true]},"uagb_author_info":{"display_name":"Caitlyn Deeter","author_link":"https:\/\/inside.wooster.edu\/technology\/author\/cdeeterwooster-edu\/"},"uagb_comment_info":0,"uagb_excerpt":"Welcome to the 20th Cybersecurity Awareness Month this October! According to the Cybersecurity and Infrastructure Security Agency (CISA), since 2004, the President of the United States and Congress have declared the month of October to be Cybersecurity Awareness Month. A dedicated month for the public and private sectors, and tribal communities to work together to&hellip;","_links":{"self":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/42241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/users\/328"}],"replies":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/comments?post=42241"}],"version-history":[{"count":6,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/42241\/revisions"}],"predecessor-version":[{"id":42278,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/42241\/revisions\/42278"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/media\/42268"}],"wp:attachment":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/media?parent=42241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/categories?post=42241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/tags?post=42241"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/coauthors?post=42241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}