{"id":24177,"date":"2021-02-12T11:17:49","date_gmt":"2021-02-12T17:17:49","guid":{"rendered":"http:\/\/blogs.uww.edu\/library\/?p=24177"},"modified":"2021-02-16T15:16:58","modified_gmt":"2021-02-16T21:16:58","slug":"personal-cyber-security-speaker-feb-23-at-530","status":"publish","type":"post","link":"https:\/\/blogs.uww.edu\/library\/archives\/24177","title":{"rendered":"Personal Cyber Security speaker, Feb. 23 at 5:30"},"content":{"rendered":"\n<p>Stealing your credit card number when you&#8217;re shopping online&#8230; phishing attacks for your password&#8230; too-good-to-be-true prize wins&#8230; identity theft&#8230;.<\/p>\n\n\n\n<p>You may think you&#8217;re too smart to fall victim to these schemes. But according to <a href=\"https:\/\/www.onelogin.com\/resource-center\/topics\/3-reasons-higher-ed-cybercriminals\">multiple<\/a> cybersecurity <a href=\"https:\/\/securityboulevard.com\/2020\/12\/why-higher-education-is-a-prime-target-for-cybercriminals\/\">organizations<\/a>, <\/p>\n\n\n\n<p><em>&#8220;&#8230;students are frequently unaware of even the most basic cybersecurity practices. Accordingly,&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.axiomhighered.com\/blog\/hackers-continue-target-higher-education\/\" target=\"_blank\">more than 30 percent<\/a>&nbsp;of higher education breaches are likely due to students falling victim to email scams, misuse of social media, or other careless activity.&#8221;<\/em><\/p>\n\n\n\n<p>Don&#8217;t let that be you! Thankfully, we have cybersecurity experts right here on campus. Hear from one of them, <strong>Brian Dennis<\/strong>, director of the <a href=\"https:\/\/cybersecuritycenterforbusiness.org\/\">Cybersecurity Center for Business<\/a>. He will talk about how you can protect yourself and your information. <\/p>\n\n\n\n<p><a href=\"https:\/\/uww.webex.com\/uww\/j.php?MTID=mb7a5ac5558313b9fa773ab828d6e26ee\">Join the Webex presentation online<\/a>, anywhere, at 5:30 on Tuesday, Feb. 23!<\/p>\n\n\n\n<p>Part of Andersen Library&#8217;s Money Smart Speaker series in spring 2021, co-sponsored with the <a href=\"https:\/\/uwwfma.org\/\">UWW Financial Management Association<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"http:\/\/www.uww.edu\/images\/library\/blog\/CybersecurityDigital.jpg\" alt=\"poster advertising the Personal Cybersecurity speaker event\" height=\"250\"><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Stealing your credit card number when you&#8217;re shopping online&#8230; phishing attacks for your password&#8230; too-good-to-be-true prize wins&#8230; identity theft&#8230;. You may think you&#8217;re too smart to fall victim to these schemes. But according to multiple cybersecurity organizations, &#8220;&#8230;students are frequently &hellip; <a href=\"https:\/\/blogs.uww.edu\/library\/archives\/24177\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7252,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[1773,52389],"class_list":["post-24177","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-money","tag-money-investing"],"_links":{"self":[{"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/posts\/24177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/users\/7252"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/comments?post=24177"}],"version-history":[{"count":4,"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/posts\/24177\/revisions"}],"predecessor-version":[{"id":24181,"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/posts\/24177\/revisions\/24181"}],"wp:attachment":[{"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/media?parent=24177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/categories?post=24177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uww.edu\/library\/wp-json\/wp\/v2\/tags?post=24177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}