{"id":5640,"date":"2025-10-06T13:40:36","date_gmt":"2025-10-06T17:40:36","guid":{"rendered":"https:\/\/www.monmouth.edu\/technology\/?page_id=5640"},"modified":"2025-10-06T13:41:07","modified_gmt":"2025-10-06T17:41:07","slug":"cybersecurity-month","status":"publish","type":"page","link":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/","title":{"rendered":"Cybersecurity Month"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"welcome-tonbspcybersecuritynbspawareness-month\">Welcome to Cybersecurity Awareness Month!<\/h2>\n\n\n<p class=\"is-style-big-body\">Throughout\u00a0October, you\u2019ll have access to helpful\u00a0resources,\u00a0tips, and\u00a0activities\u00a0designed to make cybersecurity personal\u2014protecting\u00a0both the\u00a0University\u00a0and\u00a0your own\u00a0digital life.<\/p>\n\n\n\n<p>Today\u2019s cyber\u00a0threats\u00a0are more targeted than ever. Attackers use\u00a0AI\u00a0and\u00a0impersonation tactics to trick even experienced users\u2014through\u00a0email,\u00a0collaboration tools, and\u00a0social engineering.<\/p>\n\n\n\n<p>During this month,\u00a0we will focus on\u00a0changing behavior, not just raising awareness.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"what-to-expect\"><strong>What to Expect<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Engaging content\u00a0and practical tips for spotting\u00a0imposters\u00a0whether it\u2019s phishing, deepfakes, or risky collaboration tools<\/li>\n\n\n\n<li>Tips\u00a0in\u00a0emails,\u00a0awareness training, and\u00a0visual guides\u00a0throughout campus<\/li>\n\n\n\n<li>Live event!\u00a0Come join us\u00a0<strong>Thursday,\u00a0October 9,\u00a0at Edison\/Erlanger lawn<\/strong> for\u00a0free goodies, games, and fun! Be on the lookout for appearances by\u00a0Human Error\u00a0(\u201cThe Guy in the Robe\u201d) and\u00a0Sound Judgment!\u00a0(Who are they? It might be time to catch up on some\u00a0<a href=\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/awareness-training\/#:~:text=To%20return%20to%20your%20Training%20Awareness%20Library\">Awareness Training<\/a>)<\/li>\n\n\n\n<li>Win prizes\u00a0throughout the month.<\/li>\n<\/ul>\n\n\n\n<p>Stay tuned\u00a0for more details and get ready to\u00a0<a href=\"https:\/\/play.vidyard.com\/y9tErQEg7CyKNZVUtE6Sxk?disable_popouts=1&amp;v=4.3.16&amp;type=lightbox\" target=\"_blank\" rel=\"noreferrer noopener\">spot the imposters<\/a>!<\/p>\n\n\n\n<p><strong>Stay Safe,\u00a0Stay Secure,\u00a0Cybersecurity Starts with You!<\/strong><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to&nbsp;Cybersecurity&nbsp;Awareness Month! Throughout\u00a0October, you\u2019ll have access to helpful\u00a0resources,\u00a0tips, and\u00a0activities\u00a0designed to make cybersecurity personal\u2014protecting\u00a0both the\u00a0University\u00a0and\u00a0your own\u00a0digital life. Today\u2019s cyber\u00a0threats\u00a0are more targeted than ever. Attackers use\u00a0AI\u00a0and\u00a0impersonation tactics to trick even experienced users\u2014through\u00a0email,\u00a0collaboration tools, and\u00a0social engineering. During this month,\u00a0we will focus on\u00a0changing behavior, not just raising awareness. What to Expect Stay tuned\u00a0for more details and get ready [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"parent":5216,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_mu_eop_enabled":false,"_mu_eop_name":"","_mu_eop_name_override":false,"_mu_eop_description":"","_mu_eop_description_override":false,"_mu_eop_url":"","_mu_eop_url_override":false,"_mu_eop_program_type":"","_mu_eop_educational_credential":"","_mu_eop_time_to_complete":"","_mu_eop_number_of_credits":"","_mu_eop_occupational_category":"","_mu_eop_occupational_category_code":"","_mu_eop_program_prerequisites":"","_mu_eop_application_deadline":"","_mu_eop_application_start_date":"","_mu_eop_start_date":"","_mu_eop_end_date":"","_mu_eop_day_of_week":"","_mu_eop_time_of_day":"","_mu_eop_educational_program_mode":"","_mu_eop_financial_aid_eligible":"","_mu_eop_maximum_enrollment":"","_mu_eop_offers_price":"","_mu_eop_offers_currency":"USD","_mu_eop_offers_price_per":"","_mu_eop_offers_preset":"","_mu_eop_salary_upon_completion":"","_mu_eop_training_salary":"","_mu_eop_recognized_by_name":"","_mu_eop_recognized_by_url":"","_mu_eop_concentrations":"","_mu_eop_identifier_cip":"","_mu_eop_provider_name":"","_mu_eop_provider_name_override":false,"_mu_eop_provider_url":"","_mu_eop_provider_address":"","_mu_eop_provider_city":"","_mu_eop_provider_state":"","_mu_eop_provider_zip":"","_mu_eop_provider_country":"","footnotes":""},"class_list":["post-5640","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Month | Campus Technology | Monmouth University<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Month | Campus Technology\" \/>\n<meta property=\"og:description\" content=\"Welcome to&nbsp;Cybersecurity&nbsp;Awareness Month! Throughout\u00a0October, you\u2019ll have access to helpful\u00a0resources,\u00a0tips, and\u00a0activities\u00a0designed to make cybersecurity personal\u2014protecting\u00a0both the\u00a0University\u00a0and\u00a0your own\u00a0digital life. Today\u2019s cyber\u00a0threats\u00a0are more targeted than ever. Attackers use\u00a0AI\u00a0and\u00a0impersonation tactics to trick even experienced users\u2014through\u00a0email,\u00a0collaboration tools, and\u00a0social engineering. During this month,\u00a0we will focus on\u00a0changing behavior, not just raising awareness. What to Expect Stay tuned\u00a0for more details and get ready [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/\" \/>\n<meta property=\"og:site_name\" content=\"Campus Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-06T17:41:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/\",\"url\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/\",\"name\":\"Cybersecurity Month | Campus Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.monmouth.edu\/technology\/#website\"},\"datePublished\":\"2025-10-06T17:40:36+00:00\",\"dateModified\":\"2025-10-06T17:41:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.monmouth.edu\/technology\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Support\",\"item\":\"https:\/\/www.monmouth.edu\/technology\/support\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mimecast\",\"item\":\"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity Month\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.monmouth.edu\/technology\/#website\",\"url\":\"https:\/\/www.monmouth.edu\/technology\/\",\"name\":\"Campus Technology\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.monmouth.edu\/technology\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Month | Campus Technology | Monmouth University","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Month | Campus Technology","og_description":"Welcome to&nbsp;Cybersecurity&nbsp;Awareness Month! Throughout\u00a0October, you\u2019ll have access to helpful\u00a0resources,\u00a0tips, and\u00a0activities\u00a0designed to make cybersecurity personal\u2014protecting\u00a0both the\u00a0University\u00a0and\u00a0your own\u00a0digital life. Today\u2019s cyber\u00a0threats\u00a0are more targeted than ever. Attackers use\u00a0AI\u00a0and\u00a0impersonation tactics to trick even experienced users\u2014through\u00a0email,\u00a0collaboration tools, and\u00a0social engineering. During this month,\u00a0we will focus on\u00a0changing behavior, not just raising awareness. What to Expect Stay tuned\u00a0for more details and get ready [&hellip;]","og_url":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/","og_site_name":"Campus Technology","article_modified_time":"2025-10-06T17:41:07+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/","url":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/","name":"Cybersecurity Month | Campus Technology","isPartOf":{"@id":"https:\/\/www.monmouth.edu\/technology\/#website"},"datePublished":"2025-10-06T17:40:36+00:00","dateModified":"2025-10-06T17:41:07+00:00","breadcrumb":{"@id":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/cybersecurity-month\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.monmouth.edu\/technology\/"},{"@type":"ListItem","position":2,"name":"Support","item":"https:\/\/www.monmouth.edu\/technology\/support\/"},{"@type":"ListItem","position":3,"name":"Mimecast","item":"https:\/\/www.monmouth.edu\/technology\/support\/mimecast\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity Month"}]},{"@type":"WebSite","@id":"https:\/\/www.monmouth.edu\/technology\/#website","url":"https:\/\/www.monmouth.edu\/technology\/","name":"Campus Technology","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.monmouth.edu\/technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages\/5640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/comments?post=5640"}],"version-history":[{"count":3,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages\/5640\/revisions"}],"predecessor-version":[{"id":5644,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages\/5640\/revisions\/5644"}],"up":[{"embeddable":true,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages\/5216"}],"wp:attachment":[{"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/media?parent=5640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}