{"id":56878,"date":"2016-10-03T00:00:00","date_gmt":"2016-10-03T05:00:00","guid":{"rendered":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/"},"modified":"2016-10-03T00:00:00","modified_gmt":"2016-10-03T05:00:00","slug":"you-are-best-defense-against-cyber-attackers","status":"publish","type":"post","link":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/","title":{"rendered":"You are best defense against cyber attackers"},"content":{"rendered":"<div class=\"panel body-content\"><div class=\"panel__container\"><p>October is National Cyber Security Awareness Month.  This year&#8217;s theme is &#8220;Our Shared Responsibility,&#8221; reflecting that we all make a difference when it comes to cyber security. <\/p>\n<p>You may not realize it, but you are the best defense we have against cyber attackers.  Regardless of what data you access or what systems you use, you are key in not only protecting our organization, but helping to identify and report suspicious activity.<\/p>\n<p>Fortunately, protecting yourself and our organization from cyber attackers is not as hard as you may think.  All it takes is understanding some key behaviors and following our policies and procedures.<\/p>\n<p>Beginning today, the Information Security Office is rolling out the new Information Security Awareness Training course in Blackboard. This training is required for all members of the workforce.  Have questions about the training?  Please visit the Information Security Office <a href=\"https:\/\/info.unmc.edu\/its-security\/\">website<\/a> or contact the office by <a href=\"mailto:infosecurity@unmc.edu\">email<\/a>.<\/p>\n<!-- <a rel=\"nofollow\" href=\"\/secure-location.php\" title=\"Z  RIt WK mUfdW  YI  ATXmgRF\">Z  RIt WK mUfdW  YI  ATXmgRF<\/a> --><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Understanding key behaviors, following policies and procedures is crux of maintaining security.<\/p>\n","protected":false},"author":27,"featured_media":56879,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-56878","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","department-information-security","department-its","department-unmc-today-todays-headlines"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>You are best defense against cyber attackers<\/title>\n<meta name=\"description\" content=\"Understanding key behaviors, following policies and procedures is crux of maintaining security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You are best defense against cyber attackers\" \/>\n<meta property=\"og:description\" content=\"Understanding key behaviors, following policies and procedures is crux of maintaining security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Newsroom\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/unmcedu\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-03T05:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2016\/10\/Phishing1003.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"705\" \/>\n\t<meta property=\"og:image:height\" content=\"406\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Keenan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unmc\" \/>\n<meta name=\"twitter:site\" content=\"@unmc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Keenan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/\"},\"author\":{\"name\":\"John Keenan\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#\\\/schema\\\/person\\\/59c9598a54f1a531c30cccc1d010ac17\"},\"headline\":\"You are best defense against cyber attackers\",\"datePublished\":\"2016-10-03T05:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/\"},\"wordCount\":156,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Phishing1003.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/\",\"url\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/\",\"name\":\"You are best defense against cyber attackers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Phishing1003.jpg\",\"datePublished\":\"2016-10-03T05:00:00+00:00\",\"description\":\"Understanding key behaviors, following policies and procedures is crux of maintaining security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Phishing1003.jpg\",\"contentUrl\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Phishing1003.jpg\",\"width\":705,\"height\":406},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2016\\\/10\\\/03\\\/you-are-best-defense-against-cyber-attackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"You are best defense against cyber attackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#website\",\"url\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/\",\"name\":\"Newsroom\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#organization\",\"name\":\"University of Nebraska Medical Center\",\"url\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/overview-1.png\",\"contentUrl\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/overview-1.png\",\"width\":500,\"height\":153,\"caption\":\"University of Nebraska Medical Center\"},\"image\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/unmcedu\",\"https:\\\/\\\/x.com\\\/unmc\",\"https:\\\/\\\/instagram.com\\\/iamunmc\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/UNMCEDU\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#\\\/schema\\\/person\\\/59c9598a54f1a531c30cccc1d010ac17\",\"name\":\"John Keenan\",\"url\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/author\\\/02e74f10e0327ad868d138f2b4fdd6f0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"You are best defense against cyber attackers","description":"Understanding key behaviors, following policies and procedures is crux of maintaining security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/","og_locale":"en_US","og_type":"article","og_title":"You are best defense against cyber attackers","og_description":"Understanding key behaviors, following policies and procedures is crux of maintaining security.","og_url":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/","og_site_name":"Newsroom","article_publisher":"https:\/\/www.facebook.com\/unmcedu","article_published_time":"2016-10-03T05:00:00+00:00","og_image":[{"width":705,"height":406,"url":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2016\/10\/Phishing1003.jpg","type":"image\/jpeg"}],"author":"John Keenan","twitter_card":"summary_large_image","twitter_creator":"@unmc","twitter_site":"@unmc","twitter_misc":{"Written by":"John Keenan","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/#article","isPartOf":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/"},"author":{"name":"John Keenan","@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/person\/59c9598a54f1a531c30cccc1d010ac17"},"headline":"You are best defense against cyber attackers","datePublished":"2016-10-03T05:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/"},"wordCount":156,"commentCount":0,"publisher":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#organization"},"image":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2016\/10\/Phishing1003.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/","url":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/","name":"You are best defense against cyber attackers","isPartOf":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/#primaryimage"},"image":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2016\/10\/Phishing1003.jpg","datePublished":"2016-10-03T05:00:00+00:00","description":"Understanding key behaviors, following policies and procedures is crux of maintaining security.","breadcrumb":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/#primaryimage","url":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2016\/10\/Phishing1003.jpg","contentUrl":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2016\/10\/Phishing1003.jpg","width":705,"height":406},{"@type":"BreadcrumbList","@id":"https:\/\/www.unmc.edu\/newsroom\/2016\/10\/03\/you-are-best-defense-against-cyber-attackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.unmc.edu\/newsroom\/"},{"@type":"ListItem","position":2,"name":"You are best defense against cyber attackers"}]},{"@type":"WebSite","@id":"https:\/\/www.unmc.edu\/newsroom\/#website","url":"https:\/\/www.unmc.edu\/newsroom\/","name":"Newsroom","description":"","publisher":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.unmc.edu\/newsroom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.unmc.edu\/newsroom\/#organization","name":"University of Nebraska Medical Center","url":"https:\/\/www.unmc.edu\/newsroom\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/logo\/image\/","url":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/overview-1.png","contentUrl":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/overview-1.png","width":500,"height":153,"caption":"University of Nebraska Medical Center"},"image":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/unmcedu","https:\/\/x.com\/unmc","https:\/\/instagram.com\/iamunmc","https:\/\/www.youtube.com\/user\/UNMCEDU"]},{"@type":"Person","@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/person\/59c9598a54f1a531c30cccc1d010ac17","name":"John Keenan","url":"https:\/\/www.unmc.edu\/newsroom\/author\/02e74f10e0327ad868d138f2b4fdd6f0\/"}]}},"_links":{"self":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/posts\/56878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/comments?post=56878"}],"version-history":[{"count":0,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/posts\/56878\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/media\/56879"}],"wp:attachment":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/media?parent=56878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/categories?post=56878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/tags?post=56878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}