{"id":27,"date":"2020-07-10T11:15:33","date_gmt":"2020-07-10T15:15:09","guid":{"rendered":"https:\/\/www.adelphi.edu\/it\/security\/"},"modified":"2025-09-19T10:09:24","modified_gmt":"2025-09-19T14:09:24","slug":"security","status":"publish","type":"page","link":"https:\/\/www.adelphi.edu\/it\/security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<h2>Tips to Protect Yourself<\/h2>\n<p>Whether you go online to access your email, for social networking sites, to browse for entertainment or go shopping, be aware there are people prepared to steal data from your computer. Your identity, your credit and your family information can be compromised.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tips to Protect Yourself Whether you go online to access your email, for social networking sites, to browse for entertainment or go shopping, be aware there are people prepared to steal data from your computer. Your identity, your credit and your family information can be compromised.<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-27","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<title>Information Security for Work, School &amp; Home | Adelphi University<\/title>\n<meta name=\"description\" content=\"Learn how to protect your computer and personal information when using the internet. Find out about identity theft and threats to your information security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adelphi.edu\/it\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security for Work, School &amp; Home | Adelphi University\" \/>\n<meta property=\"og:description\" content=\"Learn how to protect your computer and personal information when using the internet. Find out about identity theft and threats to your information security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adelphi.edu\/it\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-19T14:09:24+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>","yoast_head_json":{"title":"Information Security for Work, School & Home | Adelphi University","description":"Learn how to protect your computer and personal information when using the internet. Find out about identity theft and threats to your information security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adelphi.edu\/it\/security\/","og_locale":"en_US","og_type":"article","og_title":"Information Security for Work, School & Home | Adelphi University","og_description":"Learn how to protect your computer and personal information when using the internet. Find out about identity theft and threats to your information security.","og_url":"https:\/\/www.adelphi.edu\/it\/security\/","og_site_name":"Information Technology","article_modified_time":"2025-09-19T14:09:24+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.adelphi.edu\/it\/security\/","url":"https:\/\/www.adelphi.edu\/it\/security\/","name":"Information Security for Work, School & Home | Adelphi University","isPartOf":{"@id":"https:\/\/www.adelphi.edu\/it\/#website"},"datePublished":"2020-07-10T15:15:09+00:00","dateModified":"2025-09-19T14:09:24+00:00","description":"Learn how to protect your computer and personal information when using the internet. Find out about identity theft and threats to your information security.","breadcrumb":{"@id":"https:\/\/www.adelphi.edu\/it\/security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adelphi.edu\/it\/security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.adelphi.edu\/it\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adelphi.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.adelphi.edu\/it\/#website","url":"https:\/\/www.adelphi.edu\/it\/","name":"Information Technology","description":"Just another Adelphi Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adelphi.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"new_scheduled_revision":"","save_as_revision":"","_links":{"self":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/27"}],"collection":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/comments?post=27"}],"version-history":[{"count":20,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/27\/revisions"}],"predecessor-version":[{"id":755,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/27\/revisions\/755"}],"wp:attachment":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/media?parent=27"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}