{"id":10,"date":"2024-04-23T13:09:44","date_gmt":"2024-04-23T17:09:44","guid":{"rendered":"https:\/\/community.mis.temple.edu\/ehaque\/blog\/points\/cybersecurity-key-policies-and-resources\/"},"modified":"2024-04-23T13:09:44","modified_gmt":"2024-04-23T17:09:44","slug":"cybersecurity-key-policies-and-resources","status":"publish","type":"points","link":"https:\/\/community.mis.temple.edu\/ehaque\/points\/cybersecurity-key-policies-and-resources\/","title":{"rendered":"Cybersecurity: Key Policies and Resources"},"content":{"rendered":"<p>Cybersecurity can be daunting because of its technical complexity and the ever-changing threats to individuals and organizations. And more than ever, cybersecurity also is a core business function for organizations of all kinds. Just like other business issues\u2014like finance, legal, or human resources\u2014cybersecurity has its own set of external policies, laws, rules, established practices, and resources for getting help. Getting to know these policies and resources better across an organization \u2014and not just within the IT department\u2014can be hugely beneficial to any company. This course taught me how to make key cybersecurity policies and resources clear and understandable\u2014whether regarding IT, in business, or just basic interest in how information security fits in with our public policies and laws.<\/p>\n","protected":false},"author":27603,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-10","points","type-points","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/ehaque\/wp-json\/wp\/v2\/points\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/ehaque\/wp-json\/wp\/v2\/points"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/ehaque\/wp-json\/wp\/v2\/types\/points"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/ehaque\/wp-json\/wp\/v2\/users\/27603"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/ehaque\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":0,"href":"https:\/\/community.mis.temple.edu\/ehaque\/wp-json\/wp\/v2\/points\/10\/revisions"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/ehaque\/wp-json\/wp\/v2\/media?parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}