  {"id":24652,"date":"2024-06-05T08:20:03","date_gmt":"2024-06-05T12:20:03","guid":{"rendered":"https:\/\/www.montclair.edu\/information-technology\/?p=24652"},"modified":"2024-06-05T08:20:03","modified_gmt":"2024-06-05T12:20:03","slug":"it-security-tips-cyber-safety-summer-travel-edition","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/information-technology\/2024\/06\/05\/it-security-tips-cyber-safety-summer-travel-edition\/","title":{"rendered":"IT Security Tips &#8211;  Cyber Safety: Summer Travel Edition"},"content":{"rendered":"<h2>Cyber Security Getaways<\/h2>\n<p>Protecting your adventures, one click at a time!<\/p>\n<h3>Travel Lightly<\/h3>\n<p>Limit the devices you bring on your trip. The more electronic devices you bring, the more risk you open yourself to.<\/p>\n<h3>Enable 2FA or MFA<\/h3>\n<p>Before you jet off, ensure your accounts are doubly secure!<\/p>\n<h3>Pause, THINK, Post<\/h3>\n<p>Think before posting on social media while traveling! It&#8217;s safer to share your adventures after you&#8217;ve returned home to avoid potential security risks.<\/p>\n<h3>Update Software Before You Go<\/h3>\n<p>Update all your software devices before you hit the road! Keeping your software up-to-date is essential for a safe and smooth travel experience<\/p>\n<h3>Travel Wise: Secure Your Devices<\/h3>\n<p>Keep your information safe on the go by adding strong passwords to your devices. It&#8217;s an essential layer of security while traveling!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Getaways Protecting your adventures, one click at a time! Travel Lightly Limit the devices you bring on your trip. The more electronic devices you bring, the more risk you open yourself to. Enable 2FA or MFA Before you jet off, ensure your accounts are doubly secure! Pause, THINK, Post Think before posting on [&hellip;]<\/p>\n","protected":false},"author":368,"featured_media":24653,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[80,69],"class_list":["post-24652","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-cyber-security","tag-information-security"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/24652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/users\/368"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=24652"}],"version-history":[{"count":1,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/24652\/revisions"}],"predecessor-version":[{"id":24654,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/24652\/revisions\/24654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media\/24653"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=24652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/categories?post=24652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/tags?post=24652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}