{"id":881,"date":"2020-09-22T10:06:22","date_gmt":"2020-09-22T14:06:22","guid":{"rendered":"https:\/\/web.uri.edu\/cybersecurity-month\/?p=881"},"modified":"2024-09-18T08:39:07","modified_gmt":"2024-09-18T12:39:07","slug":"resources","status":"publish","type":"post","link":"https:\/\/web.uri.edu\/cybersecurity-month\/2020\/resources\/","title":{"rendered":"Resources"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Web-Resources-1024x256.jpg\" alt=\"\" class=\"wp-image-1875\" srcset=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Web-Resources-1024x256.jpg 1024w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Web-Resources-300x75.jpg 300w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Web-Resources-768x192.jpg 768w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Web-Resources-1536x384.jpg 1536w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Web-Resources-364x91.jpg 364w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Web-Resources-500x125.jpg 500w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Web-Resources-1000x250.jpg 1000w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Web-Resources-1280x320.jpg 1280w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Web-Resources.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.cisa.gov\/national-cyber-security-awareness-month\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity &amp; Infrastructure Security Agency<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/staysafeonline.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">National Cybersecurity Alliance<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/library.educause.edu\/resources\/2020\/8\/campus-security-awareness-blogs-2020\" target=\"_blank\" rel=\"noreferrer noopener\">Educause Security Awareness<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.safetynet-inc.com\/resources\/blog\/1-dont-3-dos-sending-sensitive-info\/\" target=\"_blank\" rel=\"noreferrer noopener\">Best Practices for Sending Sensitive Information in Email&#8217;s<\/a><\/li>\n\n\n\n<li><a rel=\"noreferrer noopener\" href=\"https:\/\/staysafeonline.org\/resources\/?filter=.topic-ncsam.resource-item\" target=\"_blank\">National Cybersecurity Alliance Resources<\/a><\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Video-Resources-1024x256.jpg\" alt=\"\" class=\"wp-image-1876\" srcset=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Video-Resources-1024x256.jpg 1024w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Video-Resources-300x75.jpg 300w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Video-Resources-768x192.jpg 768w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Video-Resources-1536x384.jpg 1536w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Video-Resources-364x91.jpg 364w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Video-Resources-500x125.jpg 500w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Video-Resources-1000x250.jpg 1000w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Video-Resources-1280x320.jpg 1280w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Video-Resources.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n<div class=\"fullwidth\">\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"cl-tiles thirds\">\n<div>\n<h2 style=\"text-align: center\">Passwords<\/h2>\n<p><div class=\"oembed oembed-youtu-be\" style=\"\" data-url=\"https:\/\/youtu.be\/0Wd3JoUHXno\"><iframe loading=\"lazy\" title=\"Security Awareness Episode 1: Passwords\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/0Wd3JoUHXno?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div><\/p>\n<\/div>\n<div>\n<h2 style=\"text-align: center\">Data Handling<\/h2>\n<p><div class=\"oembed oembed-youtu-be\" style=\"\" data-url=\"https:\/\/youtu.be\/hsNRrEnB_aM\"><iframe loading=\"lazy\" title=\"Security Awareness Episode 2: Data Handling\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/hsNRrEnB_aM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div><\/p>\n<\/div>\n<div>\n<h2 style=\"text-align: center\">Computer Theft<\/h2>\n<p><div class=\"oembed oembed-youtu-be\" style=\"\" data-url=\"https:\/\/youtu.be\/QiaIL-J9Vds\"><iframe loading=\"lazy\" title=\"Security Awareness Episode 3: Computer Theft\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/QiaIL-J9Vds?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div><\/p>\n<\/div>\n<\/div>\n<p class=\"cl-panel-spacer\">&nbsp;<\/p>\n<div class=\"cl-tiles thirds\">\n<div>\n<h2 style=\"text-align: center\">Phishing and Ransomware<\/h2>\n<p><div class=\"oembed oembed-youtu-be\" style=\"\" data-url=\"https:\/\/youtu.be\/D_yAYhjNE-0\"><iframe loading=\"lazy\" title=\"Security Awareness Episode 4: Phishing and Ransomware\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/D_yAYhjNE-0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div><\/p>\n<\/div>\n<div>\n<h2 style=\"text-align: center\">Removable Media<\/h2>\n<p><div class=\"oembed oembed-youtu-be\" style=\"\" data-url=\"https:\/\/youtu.be\/FRxrHduwPjY\"><iframe loading=\"lazy\" title=\"Security Awareness Episode 5: Removable Media\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/FRxrHduwPjY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div><\/p>\n<\/div>\n<div>\n<h2 style=\"text-align: center\">Vishing<\/h2>\n<p><div class=\"oembed oembed-youtu-be\" style=\"\" data-url=\"https:\/\/youtu.be\/Hc01oZPvByg\"><iframe loading=\"lazy\" title=\"Security Awareness Episode 6: Vishing\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/Hc01oZPvByg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div><\/p>\n<\/div>\n<\/div>\n<div class=\"fullwidth\">&nbsp;<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Tip-Sheets-1024x256.jpg\" alt=\"\" class=\"wp-image-1877\" srcset=\"https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Tip-Sheets-1024x256.jpg 1024w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Tip-Sheets-300x75.jpg 300w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Tip-Sheets-768x192.jpg 768w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Tip-Sheets-1536x384.jpg 1536w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Tip-Sheets-364x91.jpg 364w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Tip-Sheets-500x125.jpg 500w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Tip-Sheets-1000x250.jpg 1000w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Tip-Sheets-1280x320.jpg 1280w, https:\/\/web.uri.edu\/cybersecurity-month\/wp-content\/uploads\/sites\/1623\/Tip-Sheets.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 id=\"tablepress-1-name\" class=\"tablepress-table-name tablepress-table-name-id-1\">Cybersecurity &amp; Infrastructure Security Agency Tip Sheets<\/h2>\n\n<table id=\"tablepress-1\" class=\"tablepress tablepress-id-1\" aria-labelledby=\"tablepress-1-name\">\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-1\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\"><a href=\"https:\/\/drive.google.com\/file\/d\/1UBeSmL0L6W6ALExRS3QEBRpQ0sF25o-m\/view?usp=sharing\" rel=\"noopener noreferrer\" target=\"_blank\">Cybersecurity At Work<\/a><\/td>\n<\/tr>\n<tr class=\"row-2\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\"><a href=\"https:\/\/drive.google.com\/file\/d\/1UBeSmL0L6W6ALExRS3QEBRpQ0sF25o-m\/view?usp=sharing\" rel=\"noopener noreferrer\" target=\"_blank\">Cybersecurity While Travelling<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\"><a href=\"https:\/\/drive.google.com\/file\/d\/10GBJsZeA5w1xKTYBC6haKGiNdbaReOaP\/view?usp=sharing\" rel=\"noopener noreferrer\" target=\"_blank\">Identity Theft and Internet Scams<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\"><a href=\"https:\/\/drive.google.com\/file\/d\/1EzUdT3czgkRC9JL6S1PevV4mx9BC54NB\/view?usp=sharing\" rel=\"noopener noreferrer\" target=\"_blank\">eSkimming<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\"><a href=\"https:\/\/drive.google.com\/file\/d\/1cDZdC5JgmuO1LTjAFZLdg075FclVvyIS\/view?usp=sharing\" rel=\"noopener noreferrer\" target=\"_blank\">Internet of Things<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\"><a href=\"https:\/\/drive.google.com\/file\/d\/1O7x6Byti-nYMOv9an5Ht_BmFqSaKBXPu\/view?usp=sharing\" rel=\"noopener noreferrer\" target=\"_blank\">MultiFactor Authentication<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\"><a href=\"https:\/\/drive.google.com\/file\/d\/1aI0zhBlKK_ovdq_LNWtrmg9fawC9a_-W\/view?usp=sharing\" rel=\"noopener noreferrer\" target=\"_blank\">Online Privacy<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\"><a href=\"https:\/\/drive.google.com\/file\/d\/1n3U40gIijHlmQe69Q5tMOlN0u2wZVC8g\/view?usp=sharing\" rel=\"noopener noreferrer\" target=\"_blank\">Creating a Password<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\"><a href=\"https:\/\/drive.google.com\/file\/d\/1VClC54l-OACW35QYrqIlSTAR-75t6JV0\/view?usp=sharing\" rel=\"noopener noreferrer\" target=\"_blank\">Phishing<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\"> <a href=\"https:\/\/drive.google.com\/file\/d\/1zlkzvUiJqbjq1eBd-_EFoclcT6l4f6MI\/view?usp=sharing\" rel=\"noopener noreferrer\" target=\"_blank\">Protecting Your Digital Home<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Passwords Data Handling Computer Theft &nbsp; Phishing and Ransomware Removable Media Vishing &nbsp; &nbsp; &nbsp;<\/p>\n","protected":false},"author":3660,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[23],"tags":[],"class_list":["post-881","post","type-post","status-publish","format-standard","hentry","category-yearly"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/users\/3660"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/comments?post=881"}],"version-history":[{"count":4,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/881\/revisions"}],"predecessor-version":[{"id":1878,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/posts\/881\/revisions\/1878"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/media?parent=881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/categories?post=881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.uri.edu\/cybersecurity-month\/wp-json\/wp\/v2\/tags?post=881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}