{"id":294,"date":"2026-02-01T17:58:00","date_gmt":"2026-02-01T17:58:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/david-flowers\/?p=294"},"modified":"2026-04-29T17:00:54","modified_gmt":"2026-04-29T17:00:54","slug":"discussion-week-2-cybersecurity-best-practices-are-not-just-technical-issues","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/david-flowers\/2026\/02\/01\/discussion-week-2-cybersecurity-best-practices-are-not-just-technical-issues\/","title":{"rendered":"Discussion Week 2: Cybersecurity best practices are not just technical issues"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Cybersecurity and privacy best practices are not just technical issues since privacy also relies on other people inside of the company to keep the sensitive information that they know quite. One example is that I had a friend in a Internship during a break from school, one of the heads from another department told one of his coworkers a project that was not supposed to be released to anyone other than the 20 people that were working on it at the time. This coworker then had to be ushered into a meeting room to then sign a NDA so then this project can not get outside of the company. This process of protecting the information helped improve the security, but the security was also weakened from the department head that released this information to the coworker.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and privacy best practices are not just technical issues since privacy also relies on other people inside of the company to keep the sensitive information that they know quite. One example is that I had a friend in a Internship during a break from school, one of the heads from another department told one&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/david-flowers\/2026\/02\/01\/discussion-week-2-cybersecurity-best-practices-are-not-just-technical-issues\/\">Read More<\/a><\/div>\n","protected":false},"author":31890,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/users\/31890"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts\/294\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/posts\/294\/revisions\/295"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/media?parent=294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/categories?post=294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-flowers\/wp-json\/wp\/v2\/tags?post=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}