{"id":1389,"date":"2020-05-07T12:51:00","date_gmt":"2020-05-07T17:51:00","guid":{"rendered":"http:\/\/blogs.luc.edu\/uiso\/?p=1389"},"modified":"2020-05-07T12:51:00","modified_gmt":"2020-05-07T17:51:00","slug":"ouch-newsletter-video-conferencing-tip-sheet","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/ouch-newsletter-video-conferencing-tip-sheet\/","title":{"rendered":"OUCH! Newsletter &#8211; Video Conferencing Tip Sheet"},"content":{"rendered":"<table style=\"width: 80.7749%\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"drop\" style=\"width: 100%\" align=\"left\" valign=\"top\">\n<table class=\"stylingblock-content-wrapper\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"stylingblock-content-wrapper camarker-inner\">\n<table style=\"width: 100.211%\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 100%\" align=\"center\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table class=\"stylingblock-content-wrapper\" style=\"width: 100.122%\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"stylingblock-content-wrapper camarker-inner\" style=\"width: 100%\">\n<p class=\"body-copy\">Folks,<\/p>\n<p>We are excited to announce the May\u00a0edition of OUCH! &#8211; \u201cThe Power of Updating\u201d. You may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every day. It&#8217;s critical to keep your software up to date. Led by Guest Editor Don C. Weber, download and share OUCH! with family, friends and co-workers.<\/p>\n<p><b>The Power of Updating:\u00a0<\/b><a title=\"https:\/\/www.sans.org\/security-awareness-training\/resources\/power-updating\" href=\"https:\/\/click.email.sans.org\/?qs=239b1ca5686e42fe1e24155ef9bdaebd0c4e124089263ff48296550a93366d92a5656a8258e586ebfa5851c8d915dcb3d4bdc49f52ea65bd\" data-linkto=\"https:\/\/\">https:\/\/www.sans.org\/security-awareness-training\/resources\/power-updating<\/a><\/p>\n<p><b>OUCH! Archives:<\/b>\u00a0<a title=\"https:\/\/www.sans.org\/ouch\" href=\"https:\/\/click.email.sans.org\/?qs=239b1ca5686e42fe31dcd6e8349f4e00667691d0ac6059d999cdbbf22f774b05cff40184a1593aa3c1ba257adada3e6a768dd1eec4c3b05a\" data-linkto=\"https:\/\/\">https:\/\/www.sans.org\/ouch<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"drop\" style=\"width: 100%\" align=\"left\" valign=\"top\">\n<table class=\"stylingblock-content-wrapper\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"stylingblock-content-wrapper camarker-inner\">\n<table style=\"width: 100.102%\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\" bgcolor=\"#ffffff\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<hr size=\"2\" \/>\n<p class=\"body-copy\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/image.email.sans.org\/lib\/fe891373776d0c7e73\/m\/3\/50a54d7a-d6a1-45ce-a020-edcdcea76257.jpg\" alt=\"Working From Home\" width=\"200\" height=\"150\" align=\"right\" hspace=\"9\" data-assetid=\"86862\" \/><b>Upcoming Webcasts<\/b><\/p>\n<p><i><b><a title=\"Making Work at Home Operations Safe and Productive\" href=\"https:\/\/click.email.sans.org\/?qs=239b1ca5686e42feb95a00b65ab8555d8f644fe6e30063e9ecfeba2b191f09b3e930991aacded156375c5a7f6148f823d55691e31b0bb4e3\" data-linkto=\"https:\/\/\">Making Work at Home Operations Safe and Productive<\/a><\/b><\/i><br \/>\nThursday, May 14, 2020 at 1:00PM EDT<\/p>\n<p>This webinar includes how-to talks by John Pescatore, Lance Spitzner of SANS, and Randy Marchany, SANS Instructor and CISO of Virginia Tech. Attendees will be able to ratchet up the security of existing remote work approaches, secure emerging efforts and focus on an approach that allows for the enhancement and reuse of remote work capabilities as the world emerges from the impact of the pandemic.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table class=\"stylingblock-content-wrapper\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"stylingblock-content-wrapper camarker-inner\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\" bgcolor=\"#ffffff\">\n<tbody>\n<tr>\n<td>\n<hr \/>\n<p class=\"body-copy\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/image.email.sans.org\/lib\/fe891373776d0c7e73\/m\/3\/dcaf25a4-b341-45ad-995b-03948689f002.jpg\" alt=\"Video Conferencing\" width=\"260\" height=\"195\" align=\"left\" hspace=\"9\" data-assetid=\"86863\" \/><b>New Secure Video Conferencing Tips Sheet<\/b><\/p>\n<p>Working from home isn&#8217;t a new concept for all of us but is new for many of us. With the increase in &#8220;work from home&#8221; policies while we flatten the curve we rely on video conferencing tools to keep business going and communicate with teams. With the increase of use comes an increase in security concerns.<\/p>\n<p>We have developed this\u00a0<a title=\"Video Conferencing Tips Sheet\" href=\"https:\/\/click.email.sans.org\/?qs=239b1ca5686e42fe49ba1d0e891402f5ddc8f052142e69ebd7a07d0f34f5205b872b171d75d41d1e236f5174cba371b1dd02b0579e6460d2\" data-assetid=\"86864\" data-linkto=\"document\">Video Conferencing Tips Sheet<\/a>\u00a0to help keep your meeting private and safe.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table class=\"stylingblock-content-wrapper\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"stylingblock-content-wrapper camarker-inner\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\" bgcolor=\"#ffffff\">\n<tbody>\n<tr>\n<td>\n<hr \/>\n<p class=\"body-copy\"><a title=\"OLT Training\" href=\"https:\/\/click.email.sans.org\/?qs=239b1ca5686e42fe9e0b5cb1c6f5c5647a0c073161d6244fba357a87e853700febc5cc9f3d4f9e8fad4e93f271fc4703769424416c2eb0a9\" data-linkto=\"https:\/\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/image.email.sans.org\/lib\/fe891373776d0c7e73\/m\/3\/ecb414c3-c790-466f-b70a-0774d9bd7c47.png\" alt=\"Books to read\" width=\"260\" height=\"153\" align=\"right\" hspace=\"9\" data-assetid=\"79580\" \/><\/a><b>Virtual Training for SANS MGT433 and MGT521 Courses<\/b><\/p>\n<p>Take SANS MGT433 Security Awareness and SANS MGT521 Security Culture two-day courses live from the comfort of your own home.<\/p>\n<p>These classes are now taught virtually, with the advantages of digital course books, recordings every day of your class for review, highly interactive platforms and the SSAP credential all offered different days and timezones.<\/p>\n<p>Learn more at\u00a0<a title=\"https:\/\/www.sans.org\/ssa-events\" href=\"https:\/\/click.email.sans.org\/?qs=239b1ca5686e42fe2eeca5944c10973a0af300ede4ee8ff27df1a9570ae332d92798c693a89b83c4216a62a181199c8bf1339ee97dbbbbdb\" data-linkto=\"https:\/\/\">https:\/\/www.sans.org\/ssa-events<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table class=\"stylingblock-content-wrapper\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"stylingblock-content-wrapper camarker-inner\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\" bgcolor=\"#ffffff\">\n<tbody>\n<tr>\n<td>\n<hr \/>\n<p class=\"body-copy\"><a title=\"\" href=\"https:\/\/click.email.sans.org\/?qs=239b1ca5686e42fe41dd2e2651f67146b26c58a8376b3c0fd654b67b88fda862135e4e2ea6058ca0ad27295a7ff50b911fc8f087ccc91429\" data-linkto=\"https:\/\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/image.email.sans.org\/lib\/fe891373776d0c7e73\/m\/3\/b2d4ba7a-a6c9-4dbe-834b-16bc57273aa3.jpg\" alt=\"OLT training\" width=\"260\" height=\"217\" align=\"left\" hspace=\"9\" data-assetid=\"86666\" \/><\/a><b>World&#8217;s Best Online Cybersecurity Training<\/b><\/p>\n<p>SANS OnDemand &#8211; Training Available When You Are<\/p>\n<p>More than 45 cybersecurity training courses are available now via\u00a0<b><a title=\"OnDemand\" href=\"https:\/\/click.email.sans.org\/?qs=239b1ca5686e42fefb07812508dcef976d9b9d8801bad037e1382a67f4a6bd68349301aff38f58c274ff4c6d6f76d38a741e2e225923aaf4\" data-linkto=\"https:\/\/\">OnDemand<\/a><\/b>\u00a0allowing you to train online from home with SANS Institute\u2019s world-class instructors and self-paced content you can access for 4 months for maximum comprehension. Reach out to our GIAC-certified SMEs via email or Live Chat for assistance with difficult concepts. Practice new skills with repeatable Labs and Quizzes all while building confidence in your new knowledge.<\/p>\n<p>OnDemand training supports preparation for\u00a0<b><a title=\"GIAC certification\" href=\"https:\/\/click.email.sans.org\/?qs=239b1ca5686e42fe5f674e8e68c32b9beb1913f9584e9a5c58fe495c0e4d585d0a6c3a6332636fc8894c3df690097177420b31d81a5fb768\" data-linkto=\"https:\/\/\">GIAC certification<\/a><\/b>\u00a0attempts and provides CPE credits as well.<\/p>\n<p>Check out\u00a0about an hour of free OnDemand content with a\u00a0<b><a title=\"Course Preview\" href=\"https:\/\/click.email.sans.org\/?qs=239b1ca5686e42fe5510c933bec62a70ec89baf3d6d9ee4ebc865710954adbd773fbdabf6510dc4bb3e22697439eab25f5b38b4948be9346\" data-linkto=\"https:\/\/\">Course Preview<\/a><\/b>\u00a0today!<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"drop\" style=\"width: 100%\" align=\"left\" valign=\"top\">\n<table class=\"stylingblock-content-wrapper\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"stylingblock-content-wrapper camarker-inner\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\" bgcolor=\"#ffffff\">\n<tbody>\n<tr>\n<td>\n<hr size=\"2\" \/>\n<p class=\"body-copy\"><b>NEXT MONTH&#8217;S OUCH<\/b><\/p>\n<p>The June\u00a0edition of OUCH! will be on &#8220;Creating a Cybersecure Home&#8221;.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"drop\" style=\"width: 100%\" align=\"left\" valign=\"top\">\n<table class=\"stylingblock-content-wrapper\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"stylingblock-content-wrapper camarker-inner\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\" bgcolor=\"#ffffff\">\n<tbody>\n<tr>\n<td>\n<hr size=\"2\" \/>\n<p class=\"body-copy\">Thanks!<\/p>\n<p>Lance Spitzner<br \/>\nDirector, SANS Security Awareness<br \/>\nEmail:\u00a0<a title=\"lspitzner@sans.org\" href=\"mailto:lspitzner@sans.org?subject=OUCH!%20May%20Newsletter%20Inquiry\" data-linkto=\"mailto:\">lspitzner@sans.org<\/a><br \/>\nTwitter:\u00a0<a title=\"@lspitzner\" href=\"https:\/\/click.email.sans.org\/?qs=239b1ca5686e42fe3e8620ad34117a154d3ee384294feaab66543dd4ad81858fb9cbde5b96d5f6b806a006f079fec12a55870955294f871a\" data-linkto=\"http:\/\/\">@lspitzner<\/a><\/p>\n<p>Leverage the free\u00a0<a title=\"WFH Deployment Kit\" href=\"https:\/\/click.email.sans.org\/?qs=239b1ca5686e42fee541f7fdbfe21fcd6387494256cc4c5b170e4dd590efaf4467c8ce9cdab2ee489240bf85a70a4453420e535890b0ebf4\" data-linkto=\"https:\/\/\">WFH Deployment Kit<\/a>, everything you need to train and secure your remote workforce.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Folks, We are excited to announce the May\u00a0edition of OUCH! &#8211; \u201cThe Power of Updating\u201d. You may not realize it but cyber attackers are constantly looking for and finding new vulnerabilities and weaknesses in the software people use every day. It&#8217;s critical to keep your software up to date. Led by Guest Editor Don C. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,7],"tags":[],"class_list":["post-1389","post","type-post","status-publish","format-standard","hentry","category-front-page","category-published"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=1389"}],"version-history":[{"count":0,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1389\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=1389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=1389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=1389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}