{"id":120,"date":"2025-09-15T02:42:22","date_gmt":"2025-09-15T02:42:22","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-09-25T00:35:57","modified_gmt":"2025-09-25T00:35:57","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/","title":{"rendered":"Home"},"content":{"rendered":"<p>Hello, my name is Michelle. My first year attending Old Dominion University. I am pursing my bachelor&#8217;s degree in Cybersecurity. My goals are to become an Information Technology Auditor or IT Analyst. This is my junior year. I am currently employed with the Commonwealth of Virginia as an Auditor. I have chosen Cybersecurity as my field of interest assist with cybercrime and a growing field in technology. I am excited for becoming knowledgeable in CYE 200T Cybersecurity, technology and society. I am looking for knowledge of how cybersecurity issues are connected to cultural, political, legal. ethical, and business.\u00a0<\/p>\n<p>Personal Goals: To earn a Cybersecurity Certification within the next few months.\u00a0<\/p>\n<p>Professional Goals: To gain insights to future my professional development.\u00a0<\/p>\n<p>Cybersecurity experience: Annual security awareness training required by employer.\u00a0<\/p>\n<p>Thesis Statement: According to the article Proofpoint&#8217;s 2024 Voice of the CISO report mentioned that Chief Information Security Officer said &#8220;human error was their top cybersecurity risk at 74%. With phishing attacks and human error both increasing in cybersecurity it is critical for every organization to ensure employees are well trained to protect the assets of the organization. &#8220;Safety begins with the employee&#8221; .<\/p>\n<p><i>Citation: CISOs list human error as their top cybersecurity risk<\/i>.\u00a0<span class=\"url\">https:\/\/www.ibm.com\/think\/insights\/cisos-list-human-error-top-cybersecurity-risk<\/span><\/p>\n<p>Synthesis: To prevent human error in cybersecurity employers must provide employees with annual trainings or as needed to remain aware of cyber threats.\u00a0<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"568\" src=\"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersercurity-1024x568.jpeg\" alt=\"\" class=\"wp-image-284\" style=\"width:844px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersercurity-1024x568.jpeg 1024w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersercurity-300x166.jpeg 300w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersercurity-768x426.jpeg 768w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersercurity-1536x851.jpeg 1536w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersercurity-2048x1135.jpeg 2048w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersercurity-541x300.jpeg 541w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Diverse business team working together in city with double exposure of blurry cyber security interface<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-4-1024x682.jpg\" alt=\"\" class=\"wp-image-327\" srcset=\"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-4-1024x682.jpg 1024w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-4-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-4-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-4-1536x1024.jpg 1536w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-4-960x640.jpg 960w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-4-450x300.jpg 450w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-4.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Think-before-you-click-1024x538.jpg\" alt=\"\" class=\"wp-image-331\" style=\"width:838px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Think-before-you-click-1024x538.jpg 1024w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Think-before-you-click-300x158.jpg 300w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Think-before-you-click-768x403.jpg 768w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Think-before-you-click-571x300.jpg 571w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Think-before-you-click.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>When using technology devices, it is critical to &#8220;Think before you Click&#8221; to protect yourself from cyber threats. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"669\" src=\"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-5-1-1024x669.jpg\" alt=\"\" class=\"wp-image-334\" srcset=\"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-5-1-1024x669.jpg 1024w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-5-1-300x196.jpg 300w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-5-1-768x502.jpg 768w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-5-1-1536x1004.jpg 1536w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-5-1-459x300.jpg 459w, https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-content\/uploads\/sites\/39658\/2025\/09\/Cybersecurity-Image-5-1.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Thesis Statement: While the cost of data breaches, enhancing employee education and trainings because regularly monitor systems and evaluation, implement robust procedures and increase employee oversight and accountability.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello, my name is Michelle. My first year attending Old Dominion University. I am pursing my bachelor&#8217;s degree in Cybersecurity. My goals are to become an Information Technology Auditor or IT Analyst. This is my junior year. I am currently employed with the Commonwealth of Virginia as an Auditor. I have chosen Cybersecurity as my&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/\">Read More<\/a><\/div>\n","protected":false},"author":31262,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-json\/wp\/v2\/users\/31262"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":340,"href":"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-json\/wp\/v2\/pages\/120\/revisions\/340"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/michelle-eportfolio\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}