{"id":1819,"date":"2024-09-17T13:59:13","date_gmt":"2024-09-17T17:59:13","guid":{"rendered":"https:\/\/web.uri.edu\/cybersecurity-month\/?p=1819"},"modified":"2025-09-15T14:48:51","modified_gmt":"2025-09-15T18:48:51","slug":"week-1","status":"publish","type":"post","link":"https:\/\/web.uri.edu\/cybersecurity-month\/2024\/week-1\/","title":{"rendered":"Week 1"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Strong-Passwords-1024x256.jpg\" alt=\"creating strong passwords\" class=\"wp-image-2008\" srcset=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Strong-Passwords-1024x256.jpg 1024w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Strong-Passwords-300x75.jpg 300w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Strong-Passwords-768x192.jpg 768w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Strong-Passwords-1536x384.jpg 1536w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Strong-Passwords-364x91.jpg 364w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Strong-Passwords-500x125.jpg 500w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Strong-Passwords-1000x250.jpg 1000w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Strong-Passwords-1280x320.jpg 1280w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Strong-Passwords.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Creating Strong Passwords<\/h2>\n\n\n\n<p>Learn about the importance of strong passwords, and receive tips on how to keep your passwords strong, secure, and reliable.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button  \" href=\"https:\/\/uri-edu.zoom.us\/rec\/play\/pxLI3VoTFQwItQQ-1Yv_9tkp0hXByA5TGxgvxMlFDoWdsK2fWYFlINIgBCVSRyr88FQF8qc5sRkfDKWX.MWYcBEqpjCXifWi-?canPlayFromShare=true&amp;from=share_recording_detail&amp;continueMode=true&amp;componentName=rec-play&amp;originRequestUrl=https%3A%2F%2Furi-edu.zoom.us%2Frec%2Fshare%2FaVklcmT5wJHTHAqL2EgIN25D0JZ9zurD6Nb5Swna-Bh-bT2OzvPwquRUtd2w9Zme.jMbtAyfQXWq86TgV\" title=\"\">Watch the 2024 recording<\/a><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button  \" href=\"https:\/\/docs.google.com\/presentation\/d\/1NbcroxmgK2FvrvJQZ_0n3JoYoJflq5w9\/edit?usp=sharing&amp;ouid=101841214973944981469&amp;rtpof=true&amp;sd=true\" title=\"\">Review the presentation slides<\/a><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button  \" href=\"https:\/\/forms.gle\/rzhSvv3jERt4bnHi8\" title=\"\">Test Your password knowledge<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Creating Strong Passwords Learn about the importance of strong passwords, and receive tips on how to keep your passwords strong, secure, and reliable.<\/p>\n","protected":false},"author":5142,"featured_media":1823,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[22],"class_list":["post-1819","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-2024-weeks","tag-session"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/1819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/users\/5142"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/comments?post=1819"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/1819\/revisions"}],"predecessor-version":[{"id":2009,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/1819\/revisions\/2009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/media\/1823"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/media?parent=1819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/categories?post=1819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/tags?post=1819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}