{"id":1817,"date":"2024-09-17T13:58:31","date_gmt":"2024-09-17T17:58:31","guid":{"rendered":"https:\/\/web.uri.edu\/cybersecurity-month\/?p=1817"},"modified":"2025-09-15T14:49:59","modified_gmt":"2025-09-15T18:49:59","slug":"week-4","status":"publish","type":"post","link":"https:\/\/web.uri.edu\/cybersecurity-month\/2024\/week-4\/","title":{"rendered":"Week 4"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Software-Updates-1024x256.jpg\" alt=\"keeping software up-to-date\" class=\"wp-image-2007\" srcset=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Software-Updates-1024x256.jpg 1024w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Software-Updates-300x75.jpg 300w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Software-Updates-768x192.jpg 768w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Software-Updates-1536x384.jpg 1536w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Software-Updates-364x91.jpg 364w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Software-Updates-500x125.jpg 500w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Software-Updates-1000x250.jpg 1000w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Software-Updates-1280x320.jpg 1280w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Software-Updates.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Keeping Software Up-to-Date<\/strong><\/h2>\n\n\n\n<p>Learn about the benefits and best practices for keeping your software up to date on your personal computing devices.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button  \" href=\"https:\/\/uri-edu.zoom.us\/rec\/share\/xSdiHWneSPA72NwQtI2Hsh-Von_i5t1zbspjaTuRa1J6-1XnkypoCz4TnMn2ezPO.IfCI91Zzf1OX8qcM\" title=\"\">watch the 2024 recording<\/a><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button  \" href=\"https:\/\/docs.google.com\/presentation\/d\/1ri5AwnV9o1CPgctih7DFYE-vPsjmXTuF\/edit?usp=sharing&amp;ouid=101841214973944981469&amp;rtpof=true&amp;sd=true\" title=\"\">review the presentation slides<\/a><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button  \" href=\"https:\/\/forms.gle\/VmL8DXjb1U5SwgxG9\" title=\"\">test your software knowledge<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Keeping Software Up-to-Date Learn about the benefits and best practices for keeping your software up to date on your personal computing devices.<\/p>\n","protected":false},"author":5142,"featured_media":1822,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[22],"class_list":["post-1817","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-2024-weeks","tag-session"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/1817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/users\/5142"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/comments?post=1817"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/1817\/revisions"}],"predecessor-version":[{"id":2012,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/1817\/revisions\/2012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/media\/1822"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/media?parent=1817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/categories?post=1817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/tags?post=1817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}