{"id":5886,"date":"2020-10-19T14:11:52","date_gmt":"2020-10-19T18:11:52","guid":{"rendered":"https:\/\/technology.wooster.edu\/?p=5886"},"modified":"2022-08-22T15:38:27","modified_gmt":"2022-08-22T19:38:27","slug":"keeping-data-safe","status":"publish","type":"post","link":"https:\/\/inside.wooster.edu\/technology\/keeping-data-safe\/","title":{"rendered":"Keeping Data Safe"},"content":{"rendered":"\n<p>Happy Cyber Security Month! On Readwrite, Nirnay Butle, authors an article called &#8220;12 Things to Know About Cybersecurity Now.&#8221; In the article, it talks about ways people can lose their data which includes unauthorized links, spam messages, applications, weak privacy, and precaution. <\/p>\n\n\n\n<p>Here are some aways to keep your data safe:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Internet links that have https is more secure than the http in a URL<\/li><li>Stay away from spam messages <\/li><li>Trust an application before you give it permission because it could collect and sell your data <\/li><li>Update apps or software since outdated technology gets targeted first for malware<\/li><\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"resources\">Resources<\/h2>\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/readwrite.com\/2019\/10\/21\/12-things-to-know-about-cybersecurity-now\/\" target=\"_blank\">&#8220;12 Things to Know About Cybersecurity Now,&#8221; by Nirnay Butle via Readwrite<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/staysafeonline.org\/stay-safe-online\/online-safety-basics\/\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;Online Safety Basics,&#8221;  by the National Cybersecurity Alliance<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Happy Cyber Security Month! On Readwrite, Nirnay Butle, authors an article called &#8220;12 Things to Know About Cybersecurity Now.&#8221; In the article, it talks about ways people can lose their data which includes unauthorized links, spam messages, applications, weak privacy, and precaution. Here are some aways to keep your data safe: Internet links that have [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":5897,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[12,47],"tags":[],"coauthors":[410],"class_list":["post-5886","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-sta-article"],"acf":[],"gutentor_comment":0,"featured_image_urls":{"full":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1.jpg",1920,1357,false],"thumbnail":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1-150x150.jpg",150,150,true],"medium":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1-300x212.jpg",300,212,true],"medium_large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1-768x543.jpg",768,543,true],"large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1-1024x724.jpg",1024,724,true],"1536x1536":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1-1536x1086.jpg",1536,1086,true],"2048x2048":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1.jpg",1920,1357,false]},"post_excerpt_stackable":"<p>Happy Cyber Security Month! On Readwrite, Nirnay Butle, authors an article called &#8220;12 Things to Know About Cybersecurity Now.&#8221; In the article, it talks about ways people can lose their data which includes unauthorized links, spam messages, applications, weak privacy, and precaution. Here are some aways to keep your data safe: Internet links that have https is more secure than the http in a URLStay away from spam messages Trust an application before you give it permission because it could collect and sell your data Update apps or software since outdated technology gets targeted first for malware Resources &#8220;12 Things&hellip;<\/p>\n","category_list":"<a href=\"https:\/\/inside.wooster.edu\/technology\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/inside.wooster.edu\/technology\/category\/sta-article\/\" rel=\"category tag\">STA Article<\/a>","author_info":{"name":"Jessica Israel","url":"https:\/\/inside.wooster.edu\/technology\/author\/jisrael24wooster-edu\/"},"comments_num":"0 comments","uagb_featured_image_src":{"full":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1.jpg",1920,1357,false],"thumbnail":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1-150x150.jpg",150,150,true],"medium":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1-300x212.jpg",300,212,true],"medium_large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1-768x543.jpg",768,543,true],"large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1-1024x724.jpg",1024,724,true],"1536x1536":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1-1536x1086.jpg",1536,1086,true],"2048x2048":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/StopSpamDesktop-1.jpg",1920,1357,false]},"uagb_author_info":{"display_name":"Jessica Israel","author_link":"https:\/\/inside.wooster.edu\/technology\/author\/jisrael24wooster-edu\/"},"uagb_comment_info":0,"uagb_excerpt":"Happy Cyber Security Month! On Readwrite, Nirnay Butle, authors an article called &#8220;12 Things to Know About Cybersecurity Now.&#8221; In the article, it talks about ways people can lose their data which includes unauthorized links, spam messages, applications, weak privacy, and precaution. Here are some aways to keep your data safe: Internet links that have&hellip;","_links":{"self":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/5886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/comments?post=5886"}],"version-history":[{"count":2,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/5886\/revisions"}],"predecessor-version":[{"id":28558,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/5886\/revisions\/28558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/media\/5897"}],"wp:attachment":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/media?parent=5886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/categories?post=5886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/tags?post=5886"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/coauthors?post=5886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}