{"id":219,"date":"2014-10-28T10:05:24","date_gmt":"2014-10-28T14:05:24","guid":{"rendered":"http:\/\/blog.uvm.edu\/whysecurity\/?p=219"},"modified":"2014-10-28T10:05:24","modified_gmt":"2014-10-28T14:05:24","slug":"physical-information-security-for-everyone","status":"publish","type":"post","link":"https:\/\/blog.uvm.edu\/whysecurity\/2014\/10\/28\/physical-information-security-for-everyone\/","title":{"rendered":"Physical Information Security for Everyone"},"content":{"rendered":"<p><em>National Cybersecurity Awareness Month is an annual opportunity for folks like us to encourage folks like you to adopt a simple, three-point approach to keeping yourself and your information safe online:<\/em><\/p>\n<h2 style=\"text-align: center\">STOP.\u00a0THINK.\u00a0CONNECT?<\/h2>\n<p>As weird as it might seem, there are physical aspects to securing\u00a0information about you:\u00a0<strong>Before your data are stolen or corrupted,<\/strong> there&#8217;s a need to keep track of devices and media\u00a0containing information about you and your life.\u00a0<strong>After someone acquires\u00a0your data,<\/strong> there&#8217;s the possibility it could be used against you in the real world (online banking theft, physical robbery, extortion, and, in extreme cases, physical violence).<\/p>\n<p><strong>We encourage you to STOP<\/strong>\u00a0before leaving your laptop or phone behind in a public area during trips to the restroom; before tossing your class schedule\u00a0into the recycle bin unshredded; before posting information about your physical location, upcoming vacation (OK to post <em>afterwards!<\/em>), or financial habits.<\/p>\n<p><strong>Then THINK<\/strong>\u00a0about the possible implications of this action; whether the links in that email or text message point to an official UVM website; whether you even have an account with that bank; whether Facebook is really likely to have forgotten how to use spell-check.<\/p>\n<p><strong>Finally,\u00a0CONNECT<\/strong>\u00a0with your surroundings, both virtual and\u00a0physical: Is this a safe place to leave my laptop? Does this website seem sketchy?<\/p>\n<p>A tiny pause can mean the difference between an enjoyable experience and a messy situation. It may seem like a lot to ask, but\u00a0while we can&#8217;t claim this will make you invulnerable, it won&#8217;t be long before you don&#8217;t even realize you&#8217;re doing it.<\/p>\n<p>Safe surfing,<\/p>\n<p>Sam Hooker, for the Information Security Operations Team<\/p>\n","protected":false},"excerpt":{"rendered":"<p>National Cybersecurity Awareness Month is an annual opportunity for folks like us to encourage folks like you to adopt a simple, three-point approach to keeping yourself and your information safe online: STOP.\u00a0THINK.\u00a0CONNECT? As weird as it might seem, there are physical aspects to securing\u00a0information about you:\u00a0Before your data are stolen or corrupted, there&#8217;s a need &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.uvm.edu\/whysecurity\/2014\/10\/28\/physical-information-security-for-everyone\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Physical Information Security for Everyone&#8221;<\/span><\/a><\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-219","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Sam","author_link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/sthooker\/"},"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/comments?post=219"}],"version-history":[{"count":13,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/219\/revisions"}],"predecessor-version":[{"id":232,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/219\/revisions\/232"}],"wp:attachment":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/media?parent=219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/categories?post=219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/tags?post=219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}