{"id":394,"date":"2023-06-27T00:25:27","date_gmt":"2023-06-27T04:25:27","guid":{"rendered":"https:\/\/adrienneharris.tech\/?p=394"},"modified":"2024-11-28T23:31:29","modified_gmt":"2024-11-29T04:31:29","slug":"infosec-awareness-mailer-executives","status":"publish","type":"post","link":"https:\/\/adrienneharris.tech\/index.php\/2023\/06\/27\/infosec-awareness-mailer-executives\/","title":{"rendered":"Project: InfoSec Awareness Mailer -> Finance"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">Below is an example of Just-In-Time cybersecurity awareness content for emerging threats to reduce operational risk to tailored audiences. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><\/p>\n<cite>TO: Guice Wealth Finance Team<br>FROM: InfoSec Compliance Officer<br>SUBJECT: Don&#8217;t Be the Weak Link &#8211; Protecting Your Supply Chain<br><br>BODY: <br><a rel=\"noreferrer noopener\" href=\"https:\/\/www.ibm.com\/cloud\/blog\/5-proactive-steps-to-secure-your-supply-chain\" target=\"_blank\">Supply Chain Security<\/a> helps to ensure a  Check out this short video on the potential dangers and how you can avoid them.\u00a0<br><br>Thank you,<br>InfoSec and Compliance Department<\/cite><\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.loom.com\/share\/9a7ea2ef359a42e0a8250fcc9c4e5ea7?sid=3b6aaeee-992e-4771-a02b-3de7657f25e4\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/adrienneharris.tech\/wp-content\/uploads\/2023\/07\/Screen-Shot-2023-07-03-at-14.56.04-1024x640.png\" alt=\"\" class=\"wp-image-432\" width=\"298\" height=\"186\" srcset=\"https:\/\/adrienneharris.tech\/wp-content\/uploads\/2023\/07\/Screen-Shot-2023-07-03-at-14.56.04-1024x640.png 1024w, https:\/\/adrienneharris.tech\/wp-content\/uploads\/2023\/07\/Screen-Shot-2023-07-03-at-14.56.04-300x188.png 300w, https:\/\/adrienneharris.tech\/wp-content\/uploads\/2023\/07\/Screen-Shot-2023-07-03-at-14.56.04-768x480.png 768w, https:\/\/adrienneharris.tech\/wp-content\/uploads\/2023\/07\/Screen-Shot-2023-07-03-at-14.56.04.png 1440w\" sizes=\"auto, (max-width: 298px) 100vw, 298px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"entry-summary\">\nBelow is an example of Just-In-Time cybersecurity awareness content for emerging threats to reduce operational risk to tailored audiences. TO: Guice Wealth Finance TeamFROM: InfoSec Compliance OfficerSUBJECT: Don&#8217;t Be the Weak Link &#8211; Protecting Your Supply Chain BODY: Supply Chain Security helps to ensure a Check out this short video on the potential dangers and&hellip;\n<\/div>\n<div class=\"link-more\"><a href=\"https:\/\/adrienneharris.tech\/index.php\/2023\/06\/27\/infosec-awareness-mailer-executives\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &ldquo;Project: InfoSec Awareness Mailer -> Finance&rdquo;<\/span>&hellip;<\/a><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-394","post","type-post","status-publish","format-standard","hentry","category-uncategorised","entry"],"acf":[],"_links":{"self":[{"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/posts\/394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/comments?post=394"}],"version-history":[{"count":11,"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/posts\/394\/revisions"}],"predecessor-version":[{"id":843,"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/posts\/394\/revisions\/843"}],"wp:attachment":[{"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/media?parent=394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/categories?post=394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adrienneharris.tech\/index.php\/wp-json\/wp\/v2\/tags?post=394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}