1.0Information Security/uit/infosecjjorgoni/uit/infosec/author/jjorgoni/Online Safety Tips - Information Securityrich600338<blockquote class="wp-embedded-content" data-secret="dA5WYQdoIZ"><a href="/uit/infosec/online-safety-tips/">Online Safety Tips</a></blockquote><iframe sandbox="allow-scripts" security="restricted" src="/uit/infosec/online-safety-tips/embed/#?secret=dA5WYQdoIZ" width="600" height="338" title="“Online Safety Tips” — Information Security" data-secret="dA5WYQdoIZ" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"></iframe><script type="text/javascript"> /* <![CDATA[ */ /*! This file is auto-generated */ !function(d,l){"use strict";l.querySelector&&d.addEventListener&&"undefined"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i<o.length;i++)o[i].style.display="none";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute("style"),"height"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):"link"===t.message&&(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document); //# sourceURL=/uit/infosec/wp-includes/js/wp-embed.min.js /* ]]> */ </script> Online (Cyber) security is an issue that continues to grow in importance as more of our personal information is stored online. Criminals use viruses and phishing and hacking techniques to try and obtain personal and institutional information and access computing resources for criminal purposes. While York employs a variety of measures to help protect against […]https://infosec.yorku.ca/files/2023/07/IMG_5842.png?x31533