{"id":1815,"date":"2024-09-17T13:56:22","date_gmt":"2024-09-17T17:56:22","guid":{"rendered":"https:\/\/web.uri.edu\/cybersecurity-month\/?p=1815"},"modified":"2025-09-15T14:49:37","modified_gmt":"2025-09-15T18:49:37","slug":"week-3","status":"publish","type":"post","link":"https:\/\/web.uri.edu\/cybersecurity-month\/2024\/week-3\/","title":{"rendered":"Week 3"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Phishing-1024x256.jpg\" alt=\"Staying safe from phishing\" class=\"wp-image-2006\" srcset=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Phishing-1024x256.jpg 1024w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Phishing-300x75.jpg 300w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Phishing-768x192.jpg 768w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Phishing-1536x384.jpg 1536w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Phishing-364x91.jpg 364w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Phishing-500x125.jpg 500w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Phishing-1000x250.jpg 1000w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Phishing-1280x320.jpg 1280w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Phishing.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Staying Safe from Phishing<\/h2>\n\n\n\n<p>Learn about the dangers of phishing attempts &#8211; which can lead to ransomware or other malware attacks, how to spot them in the wild, and to report suspicious emails at URI.<a href=\"https:\/\/docs.google.com\/presentation\/d\/1TgWw7BPA1bBxmuraSv_YSYQw0Aof-Jk5\/edit?usp=sharing&amp;ouid=105750931902308404364&amp;rtpof=true&amp;sd=true\"><\/a><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button  \" href=\"https:\/\/uri-edu.zoom.us\/rec\/share\/6r4ri-4ydSvTJ-nFm8izOsFyvxB-6f3SGTBuuujq2NjIbloSZysSdS5O8Sp6yIWS.h_1swDse8z2XH3gi\" title=\"\">watch the 2024 recording<\/a><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button  \" href=\"https:\/\/docs.google.com\/presentation\/d\/1LI1PVwJQNUIYqOyodkLRfSYf8heCqHEB\/edit?usp=sharing&amp;ouid=101841214973944981469&amp;rtpof=true&amp;sd=true\" title=\"\">review the presentation slides<\/a><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button  \" href=\"https:\/\/forms.gle\/7KKCkyzKKDN6c4eFA\" title=\"\">Test Your phishing knowledge<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Staying Safe from Phishing Learn about the dangers of phishing attempts &#8211; which can lead to ransomware or other malware attacks, how to spot them in the wild, and to report suspicious emails at URI.<\/p>\n","protected":false},"author":5142,"featured_media":1821,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[22],"class_list":["post-1815","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-2024-weeks","tag-session"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/1815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/users\/5142"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/comments?post=1815"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/1815\/revisions"}],"predecessor-version":[{"id":2011,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/1815\/revisions\/2011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/media\/1821"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/media?parent=1815"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/categories?post=1815"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/tags?post=1815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}