{"id":120,"date":"2025-09-18T20:55:03","date_gmt":"2025-09-18T20:55:03","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-09-21T03:57:01","modified_gmt":"2025-09-21T03:57:01","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/","title":{"rendered":"Home"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"553\" src=\"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-1024x553.jpg\" alt=\"\" class=\"wp-image-284\" srcset=\"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-1024x553.jpg 1024w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-300x162.jpg 300w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-768x415.jpg 768w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-1536x830.jpg 1536w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-2048x1107.jpg 2048w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-555x300.jpg 555w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n<p>Protecting the digital world, one click at a time. Advanced security systems are always on guard against hacking and security breaches.<\/p>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cyber-Threats-1024x576.jpg\" alt=\"\" class=\"wp-image-314\" srcset=\"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cyber-Threats-1024x576.jpg 1024w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cyber-Threats-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cyber-Threats-768x432.jpg 768w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cyber-Threats-533x300.jpg 533w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cyber-Threats.jpg 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>Computer systems are constantly defended against a variety of cyber-attacks by cyber security professionals.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"323\" src=\"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-Business.jpg\" alt=\"\" class=\"wp-image-316\" srcset=\"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-Business.jpg 800w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-Business-300x121.jpg 300w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-Business-768x310.jpg 768w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-Business-600x242.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n<p>Companies hire well-trained and certified cybersecurity professionals who are experts in deploying and maintaining a safe system environment to avoid further breaches.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"595\" height=\"404\" src=\"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Virus-Threats.jpg\" alt=\"\" class=\"wp-image-317\" srcset=\"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Virus-Threats.jpg 595w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Virus-Threats-300x204.jpg 300w, https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Virus-Threats-442x300.jpg 442w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><\/figure><\/div>\n\n\n<p>Ransomware, malware, and phishing are three types of online threats that have been around for years. All three can be deployed via email, are detrimental to an organization, and can lead to the loss of financial or informational assets.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"286\" height=\"176\" src=\"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-content\/uploads\/sites\/39713\/2025\/09\/Cybersecurity-Framework.png\" alt=\"\" class=\"wp-image-318\" \/><\/figure><\/div>\n\n\n<p>In this digital world, enterprises must protect their systems and implement frameworks that limit the risk of cyberattacks. An organization\u2019s data is a valuable asset that must be secured from loss and damage, and here is where cybersecurity frameworks come into the scenario.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protecting the digital world, one click at a time. Advanced security systems are always on guard against hacking and security breaches. Computer systems are constantly defended against a variety of cyber-attacks by cyber security professionals. Companies hire well-trained and certified cybersecurity professionals who are experts in deploying and maintaining a safe system environment to avoid&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/\">Read More<\/a><\/div>\n","protected":false},"author":31324,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/users\/31324"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/pages\/120\/revisions\/319"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bbrow088eportfolio\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}