{"id":66,"date":"2024-12-02T17:20:05","date_gmt":"2024-12-02T17:20:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/?page_id=66"},"modified":"2024-12-02T17:32:29","modified_gmt":"2024-12-02T17:32:29","slug":"is-cybersecurity-enough-event","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/is-cybersecurity-enough-event\/","title":{"rendered":"Is Cybersecurity Enough? Event"},"content":{"rendered":"\n<p>Is Cybersecurity Enough?, a Zoom event hosted by Dr. Jonathan Avooske, offered an engaging examination of the increasing dangers that nation-state actors pose in both personal and professional contexts. Although fundamental cybersecurity procedures like multi-factor authentication and strong passwords are important, he underlined that they are not enough to fend off sophisticated attacks. In order to handle these changing challenges, Dr. Avooske emphasized the significance of proactive strategies like real-time threat intelligence, zero-trust architectures, and international cooperation. His observations reaffirmed the necessity of a thorough, flexible approach to cybersecurity in a world growing more interconnected by the day.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"778\" height=\"1024\" src=\"http:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-content\/uploads\/sites\/37818\/2024\/12\/IMG_1429-778x1024.jpeg\" alt=\"\" class=\"wp-image-72\" style=\"width:420px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-content\/uploads\/sites\/37818\/2024\/12\/IMG_1429-778x1024.jpeg 778w, https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-content\/uploads\/sites\/37818\/2024\/12\/IMG_1429-228x300.jpeg 228w, https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-content\/uploads\/sites\/37818\/2024\/12\/IMG_1429-768x1011.jpeg 768w, https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-content\/uploads\/sites\/37818\/2024\/12\/IMG_1429-600x790.jpeg 600w, https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-content\/uploads\/sites\/37818\/2024\/12\/IMG_1429-945x1244.jpeg 945w, https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-content\/uploads\/sites\/37818\/2024\/12\/IMG_1429.jpeg 1162w\" sizes=\"(max-width: 778px) 100vw, 778px\" \/><\/figure><\/div>","protected":false},"excerpt":{"rendered":"<p>Is Cybersecurity Enough?, a Zoom event hosted by Dr. Jonathan Avooske, offered an engaging examination of the increasing dangers that nation-state actors pose in both personal and professional contexts. Although fundamental cybersecurity procedures like multi-factor authentication and strong passwords are&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/is-cybersecurity-enough-event\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29851,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-json\/wp\/v2\/pages\/66"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-json\/wp\/v2\/users\/29851"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-json\/wp\/v2\/comments?post=66"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-json\/wp\/v2\/pages\/66\/revisions"}],"predecessor-version":[{"id":75,"href":"https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-json\/wp\/v2\/pages\/66\/revisions\/75"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eportfoliofinalmcros\/wp-json\/wp\/v2\/media?parent=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}