{"id":1767,"date":"2024-09-17T13:38:48","date_gmt":"2024-09-17T17:38:48","guid":{"rendered":"https:\/\/web.uri.edu\/cybersecurity-month\/?p=1767"},"modified":"2025-09-15T14:49:15","modified_gmt":"2025-09-15T18:49:15","slug":"week-2","status":"publish","type":"post","link":"https:\/\/web.uri.edu\/cybersecurity-month\/2024\/week-2\/","title":{"rendered":"Week 2"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/2FA-1024x256.jpg\" alt=\"Two-factor authentication\" class=\"wp-image-2005\" srcset=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/2FA-1024x256.jpg 1024w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/2FA-300x75.jpg 300w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/2FA-768x192.jpg 768w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/2FA-1536x384.jpg 1536w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/2FA-364x91.jpg 364w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/2FA-500x125.jpg 500w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/2FA-1000x250.jpg 1000w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/2FA-1280x320.jpg 1280w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/2FA.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Two-Factor Authentication<\/h2>\n\n\n\n<p>Learn what Two-Factor authentication is, and how it can protect you while navigating the digital landscape.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button  \" href=\"https:\/\/uri-edu.zoom.us\/rec\/share\/Dr0d3X5NJGGBzQ3cusFe_N-idARA58ETq5Abe2g7nzDZdcU1NbA-7QdnXmR5XsUF.9iLG5O_L8D0F-TgP\" title=\"\">Watch the 2024 recording<\/a><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button  \" href=\"https:\/\/docs.google.com\/presentation\/d\/1WR3kBVjk0-3PZ-oWWa5P2iniTjrjOAw1\/edit?usp=sharing&amp;ouid=101841214973944981469&amp;rtpof=true&amp;sd=true\" title=\"\">Review the presentation slides<\/a><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button  \" href=\"https:\/\/forms.gle\/gH5FeeVE8wCTn4CDA\" title=\"\">Test Your 2FA Knowledge<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Week 1 &#8211; Two-Factor Authentication<br \/>\nTuesday, October 3rd, 2024 @ 11 am <\/p>\n<p>Learn how Two-Factor Authentication can protect you while navigating the digital landscape.<\/p>\n","protected":false},"author":5142,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[22],"class_list":["post-1767","post","type-post","status-publish","format-standard","hentry","category-2024-weeks","tag-session"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/1767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/users\/5142"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/comments?post=1767"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/1767\/revisions"}],"predecessor-version":[{"id":2010,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/1767\/revisions\/2010"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/media?parent=1767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/categories?post=1767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/tags?post=1767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}