  {"id":14239,"date":"2024-10-01T11:40:08","date_gmt":"2024-10-01T15:40:08","guid":{"rendered":"http:\/\/149.4.100.129\/its\/?page_id=14239"},"modified":"2026-02-13T14:36:57","modified_gmt":"2026-02-13T19:36:57","slug":"cybersecurity-awareness-month-2024","status":"publish","type":"page","link":"https:\/\/www.qc.cuny.edu\/its\/cybersecurity-awareness-month-2024\/","title":{"rendered":"Cybersecurity Awareness Month 2024"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; next_background_color=&#8221;#ffffff&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2024\/09\/cybersecurity-full.jpg&#8221; height=&#8221;550px&#8221; max_height=&#8221;550px&#8221; custom_padding=&#8221;||||false|false&#8221; bottom_divider_style=&#8221;arrow2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;8%||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][dsm_text_divider header=&#8221;Cybersecurity&#8221; color=&#8221;#FFFFFF&#8221; divider_style=&#8221;none&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h2&#8243; header_font=&#8221;Open Sans|700||on|||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;60px&#8221; background_enable_color=&#8221;off&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_margin_tablet=&#8221;||||false|false&#8221; custom_margin_phone=&#8221;||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;20px||||false|false&#8221; header_font_size_tablet=&#8221;60px&#8221; header_font_size_phone=&#8221;35px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; background_color_tablet=&#8221;rgba(0,0,0,0.39)&#8221; background_last_edited=&#8221;on|phone&#8221; background_enable_color_tablet=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/dsm_text_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Open Sans|700||on|||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;40px&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;|20px|10px|20px|false|true&#8221; custom_padding_tablet=&#8221;|20px|20px|20px|false|true&#8221; custom_padding_phone=&#8221;|20px|10px|20px|false|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; text_font_size_tablet=&#8221;40px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; background_color_tablet=&#8221;rgba(0,0,0,0.39)&#8221; background_last_edited=&#8221;on|phone&#8221; background_enable_color_tablet=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Awareness Month<\/p>\n<p>2024<\/p>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#FFFFFF&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;51%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Open Sans|600|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;20px&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;|20px||20px|false|true&#8221; text_font_size_tablet=&#8221;20px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>#SecureOurWorld<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>October marks <strong>Cybersecurity Awareness Month<\/strong>, a global effort to encourage individuals to enhance their online security. This year\u2019s theme, \u201c<strong>Secure Our World<\/strong>,\u201d highlights the critical need to protect personal data and digital activities as cyber threats grow. CUNY is proud to join this worldwide initiative, partnering with the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA).<\/p>\n<p>Each week in October, we will share information and tips from leading Cybersecurity organizations with links to virtual events featuring guest speakers covering four essential cybersecurity topics.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][dsm_text_divider header=&#8221;Cybersecurity Awareness Month Schedule&#8221; text_alignment=&#8221;left&#8221; divider_style=&#8221;none&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h2&#8243; header_font=&#8221;Open Sans|700|||||||&#8221; custom_margin=&#8221;||15px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/dsm_text_divider][et_pb_accordion open_toggle_text_color=&#8221;#e71939&#8243; open_toggle_background_color=&#8221;#FFFFFF&#8221; closed_toggle_background_color=&#8221;#EFEFEF&#8221; icon_color=&#8221;#e71939&#8243; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;25px&#8221; module_id=&#8221;ca-accordion&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; toggle_text_color=&#8221;#000000&#8243; toggle_level=&#8221;h3&#8243; toggle_font=&#8221;Open Sans|600|||||||&#8221; toggle_font_size=&#8221;20px&#8221; toggle_line_height=&#8221;1.2em&#8221; toggle_font_size_tablet=&#8221;18px&#8221; toggle_font_size_phone=&#8221;18px&#8221; toggle_font_size_last_edited=&#8221;on|desktop&#8221; border_color_all=&#8221;#A9A9A9&#8243; global_colors_info=&#8221;{}&#8221; toggle_icon__hover_enabled=&#8221;off|desktop&#8221; toggle_font_size__hover_enabled=&#8221;off|desktop&#8221;][et_pb_accordion_item title=&#8221;Week 1: Phishing Exposed: How to Spot and Avoid the Trap&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; body_font_size=&#8221;16px&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]To kick off Cybersecurity Security Month, please join us for a virtual informative session on \u201cPhishing Exposed: How to Spot and Avoid the Trap\u201d with our <strong>Chief Information Security Officer<\/strong>, <strong>Aaron Wheeler<\/strong>, on <strong>Thursday, October 10<\/strong>, at noon. The link will be distributed 2-3 days prior the event.<\/p>\n<p>In today\u2019s digital world, phishing emails are one of the most common methods cybercriminals use to access sensitive information.<\/p>\n<p>In this session, we\u2019ll cover essential tips on:<\/p>\n<ol>\n<li><strong>Recognizing Red Flags in Phishing Emails<\/strong><br \/>\nLearn to identify common signs of phishing attempts, including suspicious links, unfamiliar senders, and unusual language patterns. We will walk you through real-world examples to help you practice detecting these scams before they harm.<\/li>\n<li><strong>The Power of Multi-factor Authentication (MFA)<\/strong><br \/>\nDiscover how implementing MFA adds an additional layer of security to your online accounts. We\u2019ll demonstrate how MFA works and explain why it\u2019s crucial for protecting personal and professional data, even if you accidentally click on a phishing link.<\/li>\n<li><strong>Aftermath of a Phishing Attack<\/strong><br \/>\nWhat happens after a phishing email successfully tricks its target? We\u2019ll cover the potential consequences of falling for a phishing scam, including financial loss, data breaches, and reputational damage. We\u2019ll also discuss the steps you should take immediately after identifying a phishing attack to minimize harm and protect others in your network.<\/li>\n<\/ol>\n<p>By the end of the session, you will have practical tools and strategies for staying one step ahead of cybercriminals and keeping your personal and professional information secure.<\/p>\n<p>Join us for this essential presentation on enhancing your digital safety skills. <a href=\"https:\/\/youtu.be\/RqPCWz5Q2pA?si=YW4NeLo_T-lmzwPU\" target=\"_blank\" rel=\"noopener\"><strong>YouTube Live Link\u00a0<\/strong><\/a>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Week 2: Data Protection &#038; Privacy: Safeguarding Your Digital Life&#8221; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; body_font_size=&#8221;16px&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p>In an age of rising data breaches and privacy concerns, understanding how to protect your personal information has never been more critical. This event, to be held virtually on <strong>Thursday, October 17 at 12pm<\/strong>, will provide invaluable insights about the importance of data protection and strategies for maintaining privacy in the digital world. The link will be distributed 2-3 days prior the event.<\/p>\n<p>As part of the College community, you have access to a wide range of digital tools and resources. However, this also increases the risk of your personal data being compromised. Whether you\u2019re a student, staff member, or faculty, understanding how to protect sensitive information will not only help safeguard your identity but also protect the integrity of the College community as a whole.<\/p>\n<ol>\n<li><strong>The Importance of Data Protection<\/strong><br \/>We\u2019ll explore why protecting sensitive data is essential, from safeguarding your identity to securing financial information. You\u2019ll learn how personal data is collected, stored, and shared by apps and websites and why taking control of your information is critical.<\/li>\n<li><strong>Understanding Privacy in the Digital Age<\/strong><br \/>Privacy is more than hiding your social media posts\u2014it\u2019s about controlling who has access to your data and how it\u2019s used. We\u2019ll explore privacy concerns that impact our students, including how educational institutions, apps, and websites handle personal information. You will learn practical steps to maintain your privacy across different platforms.<\/li>\n<li><strong>How to Protect Your Sensitive Data<\/strong><br \/>We\u2019ll cover concrete strategies for protecting your personal information, such as creating strong passwords, encryption, and enabling two-factor authentication. You\u2019ll also learn about the dangers of using unsecured Wi-Fi networks and how to safely browse the web without exposing your sensitive data.<\/li>\n<li><strong>Social Media and Privacy: What You Need to Know<\/strong><br \/>Social media can be a treasure trove for identity thieves. We\u2019ll discuss the importance of managing privacy settings on platforms like Instagram, Facebook, and TikTok and how to minimize the risk of oversharing personal details. By the end of this segment, you\u2019ll understand what publicly visible data could be used to target you.<\/li>\n<li><strong>Data Breaches and Their Impact<\/strong><br \/>What happens when your data is compromised in a breach? We\u2019ll cover real-world examples of data breaches, their impact on individuals, and how to respond if your personal information is exposed. You\u2019ll also learn the steps to take if your account is hacked and how to recover from an online security incident.<\/li>\n<li><strong>Maintaining Privacy in College Life<\/strong><br \/>College students face unique challenges when it comes to protecting their data. Personal information can be exposed easily by submitting assignments online using shared networks and public computers. We\u2019ll provide tips on protecting your privacy on campus, including managing your digital footprint and securing your academic and personal data.<\/li>\n<li><strong>Your Rights: Understanding Data Privacy Laws<\/strong><br \/>Get informed about your rights under data privacy laws, such as the GDPR (General Data Protection Regulation) and other regulations that protect personal information. We\u2019ll discuss what these laws mean for you as a student and how you can advocate for your privacy rights.<\/li>\n<\/ol>\n<p>Don\u2019t miss this important event to take charge of your data and secure your privacy. Here is the YouTube Live Link:\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=snjOYzeoh0c\" target=\"_blank\" rel=\"noopener\"><strong><u>&#8220;Data Protection &amp; Safeguarding Your Digital Life&#8221;<\/u><\/strong><\/a><\/p>\n<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Week 3: Digital Hygiene Mastery: Strengthen Your Cyber Defenses&#8221; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; body_font_size=&#8221;16px&#8221; custom_margin=&#8221;||5px||false|false&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]In today\u2019s fast-paced, tech-driven world, cyber threats are lurking around every corner, waiting to exploit vulnerabilities and steal your data. It\u2019s time to suit up, grab your virtual sword, and join the battle as a Digital Hygiene Warrior! This event will be held virtually on <strong>Thursday, October 24, at 12 pm<\/strong>, and will teach you how to wield antivirus software, defend against \u201ccyber-dirt,\u201d and leave no threat unchecked on your quest for cyber purity.<\/p>\n<ol>\n<li><strong>Mastering the Art of Digital Hygiene<\/strong><br \/>\nJust as personal hygiene is key to physical health; digital hygiene is essential for online safety. Learn about the fundamental practices of digital hygiene, from updating software regularly to using strong, unique passwords. These small, everyday actions can help you avoid major security issues and keep your devices and data clean and secure.<strong>\u00a0<\/strong><\/li>\n<\/ol>\n<ol start=\"2\">\n<li><strong>Wielding Antivirus Software Like a Sword<br \/>\n<\/strong>Antivirus software is your first defense against malware, viruses, and other cyber threats. During the event, we\u2019ll explain how antivirus programs work and show you how to use them effectively to scan, detect, and eliminate malicious software. You&#8217;ll also learn to configure antivirus settings for optimal protection, ensuring that no cyber threats slip through your defenses.<\/li>\n<\/ol>\n<ol start=\"3\">\n<li><strong>Defending Against \u201cCyber-Dirt\u201d<br \/>\n<\/strong>In the digital world, cyber-dirt refers to the threats that accumulate from poor online practices, such as opening suspicious emails, downloading unverified files, or using unsafe networks. Learn how to identify and avoid these threats by keeping your digital space clean. We\u2019ll provide tips on avoiding phishing scams, securing your devices, and staying alert to hackers\u2019 latest cyberattack tactics to compromise your data.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li><strong>Password Management: Your Cyber Shield<br \/>\n<\/strong>A strong password is like armor for your online accounts. Learn how to create and manage robust, uncrackable passwords, and understand the importance of using password managers to store them securely. We\u2019ll also discuss why changing passwords regularly and using two-factor authentication can enhance your cyber armor.<\/li>\n<\/ol>\n<ol start=\"5\">\n<li><strong>Cleaning Up Your Digital Footprint<br \/>\n<\/strong>Do you know how much personal data you\u2019ve left behind on the web? You\u2019ll learn about \u201ccleaning up\u201d your digital footprint by removing unused accounts, clearing browsing history, and securing social media profiles. Learn how to minimize the amount of personal information that\u2019s available to hackers and advertisers alike.<\/li>\n<\/ol>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Week 4: The Cyber Jungle: Strategies on Safe Internet Browsing&#8221; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; body_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]Join us for an engaging virtual event on <strong>Safe Internet Browsing<\/strong> designed to help you navigate the web safely and protect your online presence. With the growing number of cyber threats, you must be aware of the risks and proactively protect your data and devices.\u00a0Join us on <strong>Thursday, October 31, at 12 pm<\/strong>. The link will be distributed 2-3 days prior the event.<\/p>\n<p><strong>What to Expect:<\/strong><\/p>\n<ol>\n<li><strong>Understanding Internet Security Basics<br \/>\n<\/strong>We\u2019ll begin with an overview of key internet security concepts, including safe browsing habits, recognizing secure websites, and the importance of HTTPS. Learn how cybercriminals use seemingly harmless websites to launch attacks and how you can safeguard your information while browsing.<\/li>\n<li><strong>Sharpening Your Digital Defenses<br \/>\n<\/strong>Discover the most common vulnerabilities that hackers exploit, such as outdated browsers, weak passwords, and insecure Wi-Fi networks. This session will provide practical tips for addressing these issues and fortifying your digital defenses to reduce your risk of falling victim to online threats.<\/li>\n<li><strong>Safe Browsing Methodologies<br \/>\n<\/strong>Learn best practices for browsing the web securely, including how to avoid unsafe websites, spot fake ads, and identify malicious pop-ups. We\u2019ll also discuss the dangers of downloading files from unknown sources and provide tips for verifying the legitimacy of downloads and websites.<\/li>\n<li><strong>The Importance of Using Privacy Tools<br \/>\n<\/strong>Discover tools and browser extensions to enhance your privacy and security while browsing, such as ad blockers, anti-tracking software, and VPNs. Learn how these tools work, when to use them, and how they can provide an added layer of protection when online.<\/li>\n<\/ol>\n<p>Don\u2019t miss this opportunity to sharpen your digital defenses, learn best practices for safe browsing, and take control of your online privacy![\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; ul_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;Open Sans||||||||&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 style=\"font-weight: 400;\"><strong>Facts &amp; Figures:<\/strong><\/h2>\n<p>The National Cybersecurity Alliance 2023 Oh, Behave! report lists the following cybersecurity survey responses:<\/p>\n<ul style=\"font-weight: 400;\">\n<li><strong>84%<\/strong>\u00a0of people considered online safety a priority<\/li>\n<li>Only\u00a0<strong>38%<\/strong>\u00a0of people use unique passwords for all their accounts<\/li>\n<li>About a third of respondents began using a password manager after receiving cyber training<\/li>\n<li><strong>79%<\/strong>\u00a0of respondents were familiar with multifactor authentication, and\u00a0<strong>70%<\/strong>\u00a0of those who had heard of MFA security measure knew how to use it<\/li>\n<li>Only\u00a0<strong>36%<\/strong>\u00a0of people always install software updates when they become available<\/li>\n<li><strong>69%<\/strong>\u00a0of people express confidence in their ability to identify phishing attempts<\/li>\n<li><strong>51%<\/strong>\u00a0of Americans actively report cybercrimes, particularly instances of phishing<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; ul_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;Open Sans||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><strong>Additional Resources &amp; Tips:<\/strong><\/h2>\n<p>In response to a NCA survey:<\/p>\n<ul>\n<li>Weekly\u00a0<a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2024-09\/Cybersecurity-Awareness-Month-2024-Infographic.pdf\" target=\"_blank\" rel=\"noopener\">Infographic [PDF]<\/a>\u00a0to enhance your cybersecurity practices<\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/\" target=\"_blank\" rel=\"noopener\">US Cybersecurity and Infrastructure Security Agency (CISA)<\/a><\/li>\n<li><a href=\"http:\/\/www.staysafeonline.org\/\" target=\"_blank\" rel=\"noopener\">National Cyber Security Alliance (NCA)<\/a><\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2024-09\/Secure-Our-World-4-Easy-Ways-Stay-Safe-Online-Tip-Sheet.pdf\" target=\"_blank\" rel=\"noopener\">Secure Our World: 4 Easy Ways to Stay Safe Online tip sheet<\/a><\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2024-08\/CISA-SOW-Opportunities-Guide.pdf\" target=\"_blank\" rel=\"noopener\">Secure Our World: Opportunities Guide<\/a><\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/topics\/cybersecurity-best-practices\" target=\"_blank\" rel=\"noopener\">Cybersecurity Best Practices (CISA)<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; text_font_size=&#8221;16px&#8221;]<\/p>\n<h2><strong>Securely Brewed Podcast<\/strong><\/h2>\n<p><span data-teams=\"true\">A podcast that blends cybersecurity insights with real-world stories, friendly banter, and a dash of humor. As cybercriminal tactics grow more sophisticated, we\u2019re here to share practical strategies that are easy to digest and implement.\u00a0<\/span> [<a href=\"https:\/\/www.youtube.com\/playlist?list=PLm1YNbg1S0kmPu03FxGk7Af5-94EkeVx-\" target=\"_blank\" rel=\"noopener\" title=\"https:\/\/www.youtube.com\/playlist?list=PLm1YNbg1S0kmPu03FxGk7Af5-94EkeVx-\">Full Playlist<\/a>]<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.qc.cuny.edu\/its\/wp-content\/uploads\/sites\/16\/2026\/02\/securely-brewed-podcast.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; alt=&#8221;Securely Brewed Podcast with the Information Security Team&#8221; title_text=&#8221;securely-brewed-podcast&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; url=&#8221;https:\/\/www.youtube.com\/playlist?list=PLm1YNbg1S0kmPu03FxGk7Af5-94EkeVx-&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><div class=\"et_pb_module dsm_text_divider dsm_text_divider_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<div class=\"dsm-text-divider-wrapper dsm-text-divider-align-center et_pb_bg_layout_light\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"dsm-text-divider-before dsm-divider\"><\/div>\n\t\t\t\t<h2 class=\"dsm-text-divider-header et_pb_module_header\"><span>Cybersecurity<\/span><\/h2>\n\t\t\t\t<div class=\"dsm-text-divider-after dsm-divider\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>Awareness Month 2024#SecureOurWorldOctober marks Cybersecurity Awareness Month, a global effort to encourage individuals to enhance their online security. This year\u2019s theme, \u201cSecure Our World,\u201d highlights the critical need to protect personal data [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":14289,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"page_category":[],"wf_page_folders":[76],"class_list":["post-14239","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/pages\/14239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/comments?post=14239"}],"version-history":[{"count":48,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/pages\/14239\/revisions"}],"predecessor-version":[{"id":16151,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/pages\/14239\/revisions\/16151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/media\/14289"}],"wp:attachment":[{"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/media?parent=14239"}],"wp:term":[{"taxonomy":"page_category","embeddable":true,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/page_category?post=14239"},{"taxonomy":"wf_page_folders","embeddable":true,"href":"https:\/\/www.qc.cuny.edu\/its\/wp-json\/wp\/v2\/wf_page_folders?post=14239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}