{"id":13463,"date":"2022-02-25T11:03:35","date_gmt":"2022-02-25T17:03:35","guid":{"rendered":"https:\/\/blogs.tntech.edu\/techtimes\/?p=13463"},"modified":"2022-02-25T11:03:35","modified_gmt":"2022-02-25T17:03:35","slug":"cyber-threats-shields-up","status":"publish","type":"post","link":"https:\/\/blogs.tntech.edu\/techtimes\/2022\/administration\/cyber-threats-shields-up\/","title":{"rendered":"Cyber Threats &#8211; Shields Up!"},"content":{"rendered":"<p>With geopolitical tensions increasing, the Cybersecurity &amp; Infrastructure Security Agency (CISA) has issued a bulletin recommending all organizations to be especially vigilant during this time. Cyber threats are a common component in multi-front attacks, and universities are equally at risk of being the focus for one of these attacks. <a href=\"https:\/\/www.cisa.gov\/shields-up\">https:\/\/www.cisa.gov\/shields-up<\/a><\/p>\n<p>What can you do to help?<\/p>\n<ul>\n<li>Keep an eye out for any unexpected or unusual network behavior.<\/li>\n<li>Make sure any personal devices are current on their OS and app updates.<\/li>\n<li>Scrutinize all emails from senders you do not recognize. (Over 90% of cyber attacks begin with an email.)<\/li>\n<li>Report suspicious emails with the Phish Alert button in Outlook (or by forwarding it to abuse@tntech.edu).<\/li>\n<\/ul>\n<p>If you have questions or need to report odd cyber behavior, please contact the Information Security Office. (<a href=\"mailto:ociso@tntech.edu\">ociso@tntech.edu<\/a>)<\/p>\n<p>Everyone has a part in helping our campus stay cyber safe!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With geopolitical tensions increasing, the Cybersecurity &amp; Infrastructure Security Agency (CISA) has issued a bulletin recommending all organizations to be especially vigilant during this time. Cyber threats are a common component in multi-front attacks, and universities are equally at risk of being the focus for one of these attacks. https:\/\/www.cisa.gov\/shields-up What can you do to [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[9],"tags":[23,22,25],"class_list":{"0":"post-13463","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-administration","7":"tag-facstaff","8":"tag-student","9":"tag-un"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/posts\/13463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/comments?post=13463"}],"version-history":[{"count":2,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/posts\/13463\/revisions"}],"predecessor-version":[{"id":13483,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/posts\/13463\/revisions\/13483"}],"wp:attachment":[{"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/media?parent=13463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/categories?post=13463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/tags?post=13463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}