{"id":1556,"date":"2020-12-02T13:19:04","date_gmt":"2020-12-02T19:19:04","guid":{"rendered":"http:\/\/blogs.luc.edu\/uiso\/?p=1556"},"modified":"2020-12-02T13:19:04","modified_gmt":"2020-12-02T19:19:04","slug":"ouch-newsletter-securing-the-generation-gap","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/ouch-newsletter-securing-the-generation-gap\/","title":{"rendered":"OUCH! Newsletter &#8211; Securing The Generation Gap"},"content":{"rendered":"\n<p>Folks,<br \/><br \/>We are excited to announce December&#8217;s edition of OUCH! &#8211; \u201c<b>Securing The Generation Gap<\/b>\u201d. Trying to securely make the most of today\u2019s technology can be overwhelming for almost all of us, but it can be especially challenging for family members not as used to or as familiar with technology. Therefore, we wanted to share some key steps to help secure family members who may be struggling with technology and might misunderstand the risks that come with using it. Led by Guest Editor Chris Dale, download and share OUCH! with family, friends and co-workers, and as always translated into over 20 languages.<\/p>\n<p><b>Securing The Generation Gap:\u00a0<\/b><a title=\"https:\/\/sans.org\/security-awareness-training\/resources\/securing-generation-gap\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c38a64b6c13a1c663452cfd15a4469389e7bfb4cf4bc086876b5ad9cd5b810ed9df05468c9f8469c89f181882425fe03cb\" data-linkto=\"https:\/\/\">https:\/\/sans.org\/security-awareness-training\/resources\/securing-generation-gap<\/a><br \/><br \/><b>OUCH! Archives:<\/b>\u00a0<a title=\"https:\/\/www.sans.org\/ouch\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c351afde8a8be708c98fac5b302cc64d68819e58cd4154d1009c6b1fe1231aef26f55d4f836c0c27fb0be1e698dfce4003\" data-linkto=\"https:\/\/\">https:\/\/www.sans.org\/ouch<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p><b>Cyber Camp for Teens<\/b><br \/><br \/>Securing The Generation Gap can start with the kids! It\u2019s not news to anyone that kids today catch on quickly to technology. Why not use their strengths to support the seniors in their lives?<br \/><br \/>Sign your teenager up for SANS second ever FREE Cyber Camp for Teens, Dec 29-30th from 12 \u2013 5 pm EST each day. The camp brings together a group of cyber security experts discussing the latest topics and trends in IT Security, including how to better protect yourself and those around you, in an appealing and approachable way to engage teenagers.<\/p>\n<p><a title=\"Register here\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c3875964fc354b24b3f38b79b9b7f381de36b3f17429c72dcd9dabb4955d2f66cc70b136327c345c7f63f230718ed3dc7e\" data-linkto=\"https:\/\/\">Register here<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p><b>The New Game Changer for High School Students<\/b><br \/><br \/>Last month SANS launched its largest public service effort to date. CyberStart America will enable up to 100,000 U.S. high school students to play a fun, immersive cybersecurity game where they solve realistic cybersecurity challenges while playing the role of a cyber protection agent.<br \/><br \/>They will get to play CyberStart Game through the end of February, and students who complete at least 20 percent of the challenges will be eligible to enter a scholarship round where they can win $2,000,000 in scholarships to be used at the colleges they attend.<\/p>\n<p><a title=\"Learn more here\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c34b6f2715e32db20fc6c4c359623e2b3669ebcc3733ad44bcce6b33468ef824a4b661a08ec0d3b5e3a0f12beff6a9c3bb\" data-linkto=\"https:\/\/\">Learn more here<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p class=\"body-copy\"><b><a title=\"OnDemand Button\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c30714216c6642173e6ef91f9c350c46acbc9b2d0babe21624434518dc7638773303f0cd00692f6ccc6ce0401a16c3aace\" data-linkto=\"https:\/\/\">SANS Training<\/a><\/b><br \/><b>Ending Soon &#8211; Best Special Offers of the Year\u00a0<\/b>on ALL SANS 5 or 6 day Courses!<b>\u00a0<\/b>Includes<b>\u00a0OnDemand\u00a0<\/b>and<b>\u00a0Live Online!!<\/b><br \/><br \/>Don&#8217;t miss the great\u00a0<a title=\"Tech Offers and Discounts\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c3000a366d74dc31f91c662eef8e1035657d5ba4b466528ce6b03d29157c43a0f0fa96354caea6377cd508eddff09b84bb\" data-linkto=\"https:\/\/\">Tech Offers and Discounts<\/a>\u00a0available thru December 16 with your SANS 5 or 6 day course registration.\u00a0<br \/><br \/><b>OnDemand &#8211; New Courses<\/b><br \/>Check out the new courses available in SANS\u00a0OnDemand which features self-paced training with four months of course access. Subject-Matter-Expert support and hands-on Labs, let you reinforce new skills from home when your schedule allows.\u00a0<br \/><br \/>Check out the new content with a\u00a0<a title=\"Demo\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c3d8f40bfee9b75cf9822fe1aab5d539879d3aadb342b70a3936479286c8ee13db61fd4c0743f477fb27c99c4ee8770edb\" data-linkto=\"https:\/\/\">Demo<\/a>\u00a0on the OnDemand Platform for these and many other SANS courses.<\/p>\n<ul>\n<li class=\"body-copy\"><a title=\"SEC588: Cloud Penetration Testing\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c32f875e672f2ac8335825afeb4e2d13863c2f19122658a6c1989d3e03a88114fd7149f831c4d2edc96fc5fda61f654b42\" data-linkto=\"https:\/\/\">SEC588: Cloud Penetration Testing<\/a><\/li>\n<li class=\"body-copy\"><a title=\"MGT525:\u00a0IT Project Management, Effective Communication, and PMP\u00ae Exam Prep\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c35212839a56ca1ced9993907203f08f5a576955d05eaae1785ea9626eb5d56bc25a9f9857dc0481e6cb4676c9efd39bad\" data-linkto=\"https:\/\/\">MGT525:\u00a0IT Project Management, Effective Communication, and PMP\u00ae Exam Prep<\/a>\u00a0<\/li>\n<li class=\"body-copy\"><a title=\"SEC760: Advanced Exploit Development for Penetration Testers\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c3a55b3213aee3457873e7bdede4d5ba26e4bc55160b3e252551abebcfffc8921a8af0829908ab56a12c56a7ec39fa266c\" data-linkto=\"https:\/\/\">SEC760: Advanced Exploit Development for Penetration Testers<\/a><\/li>\n<li class=\"body-copy\"><a title=\"MGT516:\u00a0Managing Security Vulnerabilities: Enterprise and Cloud\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c365b787315ef13b6af0ebac4b8da8dfeb22b3f5badb76acb66339db106a633a2f65e59683a5e0597889a7a5334f52fe0d\" data-linkto=\"https:\/\/\">MGT516:\u00a0Managing Security Vulnerabilities: Enterprise and Cloud<\/a>\u00a0<\/li>\n<li class=\"body-copy\"><a title=\"ICS456:\u00a0Essentials for NERC Critical Infrastructure Protection\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c36b671eecdb4bf6cee05dde590981fb806f195fe6fe07610906fea657936500cd82ebde0c87270278d477df2656d5f802\" data-linkto=\"https:\/\/\">ICS456:\u00a0Essentials for NERC Critical Infrastructure Protection<\/a>\u00a0<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p><b>OUCH! Newsletter Guest Author &#8211; Chris Dale<\/b><br \/><br \/>Chris Dale (Twitter\u00a0<a title=\"@chrisadale\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c3ebeb45c63b5150596d7967930fbf748954931b31c8bbe68a618c9ec2fba84821272056ab36eaf92046e11b1f79f8384b\" data-linkto=\"https:\/\/\">@chrisadale<\/a>) is a principal consultant at River Security, an European security consulting firm, and a\u00a0<a title=\"certified SANS instructor\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c3b05978f1e595d979444253f6ee5650a58028a397760ac20e91e4351ec1db7fa629485653c3ebc124d4a97b257e915ff2\" data-linkto=\"https:\/\/\">certified SANS instructor<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p><b>NEXT MONTH&#8217;S OUCH<\/b><br \/><br \/>The January edition of OUCH! will be on &#8220;Protecting Your Wi-Fi at Home&#8221;.<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<p>Thanks!<br \/><br \/>Lance Spitzner<br \/>Director, SANS Security Awareness<br \/>Email:\u00a0<a title=\"lspitzner@sans.org\" href=\"mailto:lspitzner@sans.org?subject=OUCH!%20December%20Newsletter%20Inquiry\" data-linkto=\"mailto:\">lspitzner@sans.org<\/a><br \/>Twitter:\u00a0<a title=\"@lspitzner\" href=\"https:\/\/click.email.sans.org\/?qs=c4323b92d20f49c368573a94cf598104fd2d0078bde630f26fae6fa0c34d47ef73d267bd70fae1ac1beb0cf70de1ed2567686c09781993bd\" data-linkto=\"http:\/\/\">@lspitzner<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,5,6,7],"tags":[47,45,55,52,11],"class_list":["post-1556","post","type-post","status-publish","format-standard","hentry","category-front-page","category-phishing","category-public-service-announcement","category-published","tag-ouch","tag-newsletter","tag-security","tag-sans","tag-awareness"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=1556"}],"version-history":[{"count":0,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1556\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=1556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=1556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=1556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}