{"id":1108,"date":"2024-09-23T11:20:10","date_gmt":"2024-09-23T15:20:10","guid":{"rendered":"https:\/\/web.uri.edu\/draft-its\/?p=1108"},"modified":"2024-12-12T08:50:25","modified_gmt":"2024-12-12T13:50:25","slug":"endpoint-security","status":"publish","type":"post","link":"https:\/\/web.uri.edu\/draft-its\/endpoint-security\/","title":{"rendered":"Endpoint Security"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\">Endpoint Security<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Endpoint-Security.jpg\" alt=\"\" class=\"wp-image-54466\" style=\"width:250px;height:250px\" srcset=\"https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Endpoint-Security.jpg 1000w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Endpoint-Security-300x300.jpg 300w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Endpoint-Security-150x150.jpg 150w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Endpoint-Security-768x768.jpg 768w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Endpoint-Security-364x364.jpg 364w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Endpoint-Security-500x500.jpg 500w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n<p>Securing your devices is crucial in protecting university data and information. Endpoint security involves identifying vulnerable configurations and disabling unnecessary services to reduce attack surfaces.<\/p>\n\n\n\n<p>Out-of-the-box configurations for operating systems and applications are typically optimized for ease of use, not security. Default settings\u2014such as open services, default accounts, passwords, and outdated protocols\u2014can leave systems vulnerable. ITS Security Services works closely with your department or college to apply strong configuration settings and harden your devices.<\/p>\n\n\n\n<p>Rather than creating security baselines from scratch, ITS Security Services leverages publicly vetted and supported security benchmarks, guides, and checklists to ensure comprehensive protection across all systems.<\/p>\n\n\n\n<p><strong>More information can be found at <a href=\"https:\/\/security.uri.edu\/\">security.uri.edu<\/a> or if you require consultation please contact the ITS Service Desk.<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><section class=\"cl-wrapper cl-boxout-wrapper\"><div class=\"cl-boxout  \">\n\n<h3 class=\"wp-block-heading has-text-align-center\">Executive Lead<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Michael Khalfayan<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Technical Lead<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Michael Khalfayan<br>mkhalfayan@uri.edu<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Support Team<\/h3>\n\n\n\n<p class=\"has-text-align-center\">ITS Security<\/p>\n\n<\/div><\/section><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Secure devices by hardening configurations and eliminating vulnerabilities.<\/p>\n","protected":false},"author":5142,"featured_media":54515,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[24],"tags":[108,105,103,51,107,106,8,63,104,19],"class_list":["post-1108","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-services","tag-computer-hardening","tag-consult","tag-consultation-services","tag-consulting","tag-endpoint-security","tag-secure-computing","tag-sec","tag-security-privacy","tag-service-offered","tag-services"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts\/1108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/users\/5142"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/comments?post=1108"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts\/1108\/revisions"}],"predecessor-version":[{"id":54478,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts\/1108\/revisions\/54478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/media\/54515"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/media?parent=1108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/categories?post=1108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/tags?post=1108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}