{"id":3870,"date":"2016-10-29T13:12:22","date_gmt":"2016-10-29T17:12:22","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3870"},"modified":"2016-10-29T13:12:22","modified_gmt":"2016-10-29T17:12:22","slug":"security-october-is-national-cyber-security-awareness-month-how-secure-is-your-enterprise","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/10\/29\/security-october-is-national-cyber-security-awareness-month-how-secure-is-your-enterprise\/","title":{"rendered":"SECURITY October is National Cyber Security Awareness Month: How secure is your enterprise?"},"content":{"rendered":"<p>October is national cyber security awareness month. According to the author of this article, Mark Kaelin, this is an opportunity for enterprises of all sizes to take time to educate their workforce on lurking cyber security threats. We hold a \u201cSelfies for Security Challenge\u201d at my company in celebration of cyber security awareness this month. This is a selfie contest in which employees take selfies to display how they are protecting the company and our clients. Please share how cyber security awareness month is being celebrated this year if this is something they also do at your company or anywhere else you may know.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.techrepublic.com\/article\/october-is-national-cyber-security-awareness-month-how-secure-is-your-enterprise\/\">http:\/\/www.techrepublic.com\/article\/october-is-national-cyber-security-awareness-month-how-secure-is-your-enterprise\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>October is national cyber security awareness month. According to the author of this article, Mark Kaelin, this is an opportunity for enterprises of all sizes to take time to educate their workforce on lurking cyber security threats. We hold a \u201cSelfies for Security Challenge\u201d at my company in celebration of cyber security awareness this month. [&hellip;]<\/p>\n","protected":false},"author":11666,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[716552],"tags":[],"class_list":{"0":"post-3870","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-09-it-outsourcing-cloud-computing","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11666"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3870"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3870\/revisions"}],"predecessor-version":[{"id":3871,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3870\/revisions\/3871"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}