{"id":2,"date":"2020-03-31T10:50:02","date_gmt":"2020-03-31T10:50:02","guid":{"rendered":"https:\/\/www.jsums.edu\/cyberawareclone-demo\/?page_id=2"},"modified":"2025-10-07T15:16:10","modified_gmt":"2025-10-07T15:16:10","slug":"sample-page","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/jsu-cyber-security\/","title":{"rendered":"JSU CYBER AWARENESS"},"content":{"rendered":"<p><strong>The vision of JSU IT\u2019s Information Security Office is to mitigate\u00a0<\/strong><strong>risk for the University<\/strong>\u00a0through the development and maintenance of JSU\u2019s Information Security strategy, which includes IT policies and best practices, security training and awareness programs, security monitoring and operations, secure architecture and vulnerability management. Our goal is to balance\u00a0<strong>confidentiality<\/strong>\u00a0(keeping private matters private),\u00a0<strong>integrity<\/strong>\u00a0(assuring that your information is complete and accurate) and\u00a0<strong>availability<\/strong>\u00a0(having timely and reliable access to your information).<\/p>\n<p><strong>Information security is a team effort. We alone cannot accomplish this. You play a key role in protecting information.\u00a0<\/strong>Be knowledgeable. Be aware. Be proactive. Help us to keep JSU standing strong against cyber threats and attacks!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The vision of JSU IT\u2019s Information Security Office is to mitigate\u00a0risk for the University\u00a0through the development and maintenance of JSU\u2019s Information Security strategy, which includes IT policies and best practices, security training and awareness programs, security monitoring and operations, secure architecture and vulnerability management. Our goal is to balance\u00a0confidentiality\u00a0(keeping private matters private),\u00a0integrity\u00a0(assuring that your information [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/2"}],"collection":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":6,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":1498,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/2\/revisions\/1498"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}