{"id":246778,"date":"2025-02-17T20:58:05","date_gmt":"2025-02-17T20:58:05","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/"},"modified":"2025-02-17T20:58:05","modified_gmt":"2025-02-17T20:58:05","slug":"training-employees-on-cyber-security","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/","title":{"rendered":"Step-by-Step Guide for Training Employees on Cyber Security"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the ever-evolving landscape of <strong>cybersecurity<\/strong>, the <strong>leaked password<\/strong> &#034;password123&#034; has emerged as a glaring example of the vulnerabilities that plague online security practices. This seemingly innocuous combination has appeared in numerous <strong>data breaches<\/strong> and leaks, often topping the list of the most commonly compromised passwords. Its significance lies in the fact that it highlights the critical need for users to adopt <strong>stronger, more complex passwords<\/strong>, as well as the importance of unique passwords for different accounts. With countless individuals still using easily guessable passwords, the repercussions of such leaks serve as a stark reminder of the ongoing threats in the digital realm and the necessity for <strong>heightened awareness<\/strong> and proactive measures among users.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Assessing_Your_Organizations_Current_Security_Awareness_Level\" >Assessing Your Organization&#039;s Current Security Awareness Level<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Establishing_Clear_Training_Objectives_and_Goals\" >Establishing Clear Training Objectives and Goals<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Developing_a_Comprehensive_Training_Curriculum\" >Developing a Comprehensive Training Curriculum<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Implementing_Interactive_Learning_Methods_and_Tools\" >Implementing Interactive Learning Methods and Tools<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Creating_Realistic_Security_Simulations_and_Scenarios\" >Creating Realistic Security Simulations and Scenarios<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Measuring_Training_Effectiveness_and_Employee_Progress\" >Measuring Training Effectiveness and Employee Progress<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Maintaining_Continuous_Security_Education_and_Updates\" >Maintaining Continuous Security Education and Updates<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Q1_How_Much_Should_We_Budget_Annually_for_Employee_Cybersecurity_Training_Programs\" >Q1: How Much Should We Budget Annually for Employee Cybersecurity Training Programs?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Q2_Can_Remote_Workers_Use_Personal_Devices_While_Accessing_Company_Resources\" >Q2: Can Remote Workers Use Personal Devices While Accessing Company Resources?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Q3_What_Legal_Responsibilities_Do_Employees_Have_Regarding_Data_Breaches\" >Q3: What Legal Responsibilities Do Employees Have Regarding Data Breaches?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Q4_How_Often_Should_Employees_Change_Their_Passwords_Across_Different_Systems\" >Q4: How Often Should Employees Change Their Passwords Across Different Systems?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#Q5_Should_Employees_Be_Penalized_for_Repeatedly_Failing_Security_Awareness_Tests\" >Q5: Should Employees Be Penalized for Repeatedly Failing Security Awareness Tests?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/logmeonce.com\/resources\/training-employees-on-cyber-security\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Conduct initial security awareness assessments through quizzes and behavior monitoring to identify knowledge gaps and training needs.<\/li>\n<li>Create specific, measurable training objectives focused on essential skills like phishing detection and password management.<\/li>\n<li>Develop a structured curriculum starting with basic security concepts before advancing to more complex cybersecurity topics.<\/li>\n<li>Implement interactive learning methods including simulations, games, and hands-on exercises to enhance engagement and retention.<\/li>\n<li>Track progress through regular assessments and adjust training based on employee performance and feedback.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Assessing_Your_Organizations_Current_Security_Awareness_Level\"><\/span>Assessing Your Organization&#039;s Current Security Awareness Level<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>How well does your team understand <strong>cyber security<\/strong>? Let&#039;s find out together with a <strong>fun little checkup<\/strong> &#8211; like taking your temperature when you&#039;re not feeling well!<\/p>\n<p>I&#039;ll help you create a <strong>quick quiz<\/strong> to see what your employees know about staying safe online. Think of it as a treasure hunt for knowledge!<\/p>\n<p>We&#039;ll look for clues about whether they can spot <strong>tricky email scams<\/strong> (like finding the imposter in a game of hide-and-seek), if they use <strong>strong passwords<\/strong> (better than &#034;password123&#034;!), and how they handle company information.<\/p>\n<p>You can start by watching how they work.<\/p>\n<p>Do they leave their computers accessible during lunch? Are they sharing passwords like they share cookies?<\/p>\n<p>These simple observations will show you exactly where your team needs the most help!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Establishing_Clear_Training_Objectives_and_Goals\"><\/span>Establishing Clear Training Objectives and Goals<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that we recognize where your team stands, let&#039;s set some fun targets for our <strong>cyber security adventure<\/strong>!<\/p>\n<p>Think of <strong>training goals<\/strong> like leveling up in a video game &#8211; each level makes you stronger and smarter! I&#039;ll help you set clear objectives that are as easy to understand as your favorite recipe.<\/p>\n<p>First, decide what <strong>specific<\/strong> skills you want your team to learn, like spotting tricky emails or creating super-strong passwords.<\/p>\n<p>Let&#039;s break it down into bite-sized pieces, just like eating a sandwich! We&#039;ll set goals that are <strong>SMART<\/strong> &#8211; that means they&#039;re Specific (like &#034;learn to spot fake emails&#034;), Measurable (we can test it!), Achievable (not too hard), Relevant (it matters), and <strong>Time-bound<\/strong> (we&#039;ll set fun deadlines).<\/p>\n<p>Incorporating <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-vs-two-factor-authentication\/\">multi-factor authentication<\/a> can also enhance your team&#039;s overall cyber security knowledge and practices.<\/p>\n<p>What skills do you think are most important for your team?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Developing_a_Comprehensive_Training_Curriculum\"><\/span>Developing a Comprehensive Training Curriculum<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Building your <strong>cyber security training<\/strong> is like creating the world&#039;s most amazing sandwich!<\/p>\n<p>I&#039;ll help you mix all the right ingredients to make your training super tasty and effective. First, we&#039;ll add the basics &#8211; that&#039;s like the bread of our sandwich &#8211; teaching everyone about <strong>passwords and email safety<\/strong>.<\/p>\n<p>Next, we&#039;ll pile on some yummy <strong>phishing awareness<\/strong> (that&#039;s when bad guys try to trick you, like a wolf in sheep&#039;s clothing!). Have you ever played &#034;spot the difference&#034; games? That&#039;s exactly what we&#039;ll do with real vs. fake emails!<\/p>\n<p>For the special sauce, we&#039;ll add <strong>fun quizzes<\/strong>, videos, and hands-on practice. Just like you wouldn&#039;t want a sandwich without cheese, we can&#039;t forget <strong>role-playing exercises<\/strong>!<\/p>\n<p>Incorporating <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/bypass-mfa\/\">multi-factor authentication<\/a> into your training will also ensure that employees understand the importance of securing their accounts beyond just passwords.<\/p>\n<p>Ready to build this cyber security sandwich with me?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Implementing_Interactive_Learning_Methods_and_Tools\"><\/span>Implementing Interactive Learning Methods and Tools<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Learning about <strong>cyber security<\/strong> should feel like playing your favorite video game! I&#039;ll show you some super fun ways to learn about keeping safe online.<\/p>\n<p>Have you ever played Simon Says? We can use games like that to practice spotting sneaky <strong>phishing emails<\/strong>! I love setting up <strong>virtual scavenger hunts<\/strong> where you&#039;ll search for security clues and earn points. It&#039;s just like collecting coins in Mario!<\/p>\n<p>Let&#039;s try some cool simulations too &#8211; they&#039;re like pretend situations where you get to be the cyber hero! We&#039;ll use special apps that let you practice creating <strong>strong passwords<\/strong>, and you&#039;ll earn badges for each new skill you master.<\/p>\n<p>Want to know something awesome? We can even use <strong>virtual reality goggles<\/strong> to explore a 3D cyber world! You&#039;ll get to zap away bad viruses like a security superhero. Plus, learning about <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/how-mfa-works\/\">multi-factor authentication<\/a> will help you understand how to protect your online accounts even better!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Creating_Realistic_Security_Simulations_and_Scenarios\"><\/span>Creating Realistic Security Simulations and Scenarios<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Ready to be a <strong>cyber detective<\/strong>? I&#039;m going to show you how to practice <strong>spotting sneaky cyber tricks<\/strong> using fun pretend situations!<\/p>\n<p>It&#039;s like playing &#034;I Spy&#034; but with computer safety.<\/p>\n<p>Let&#039;s create some real-world scenarios. Have you ever gotten an email saying you won a million dollars? That&#039;s exactly what we&#039;ll practice with!<\/p>\n<p>I&#039;ll set up fake (but safe) <strong>phishing emails<\/strong>, and you&#039;ll learn to spot the clues that show they&#039;re not real.<\/p>\n<p>We&#039;ll also play &#034;Spot the Password Problem&#034; &#8211; where you&#039;ll help imaginary characters fix their weak passwords.<\/p>\n<p>Think of it as a <strong>cyber treasure hunt<\/strong>. You&#039;ll search for <strong>digital clues<\/strong>, solve security puzzles, and learn how to keep your computer safe.<\/p>\n<p>Ready to start solving these cyber mysteries?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Measuring_Training_Effectiveness_and_Employee_Progress\"><\/span>Measuring Training Effectiveness and Employee Progress<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>To see if our <strong>cyber training<\/strong> is working, we need to play detective again! Just like when you check if you&#039;ve learned your ABCs, we need to make sure everyone understands how to stay safe online.<\/p>\n<p>It&#039;s like being a <strong>safety superhero<\/strong> who keeps track of their special powers!<\/p>\n<p>Here&#039;s how I measure if our cyber training is super effective:<\/p>\n<ol>\n<li>Give fun quizzes that test knowledge &#8211; think of them as cyber security treasure hunts<\/li>\n<li>Watch how people handle pretend email tricks, like spotting a sneaky phishing message<\/li>\n<li>Track improvement scores over time, just like leveling up in your favorite video game<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Maintaining_Continuous_Security_Education_and_Updates\"><\/span>Maintaining Continuous Security Education and Updates<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Staying safe online isn&#039;t a one-time thing, just like how you don&#039;t brush your teeth only once! I want you to think of <strong>cyber security<\/strong> like your favorite video game &#8211; there are always new levels and challenges to master.<\/p>\n<p>I&#039;ll help you stay up-to-date with the <strong>latest security tricks<\/strong>. Every month, we&#039;ll learn about new ways bad guys try to trick us &#8211; kind of like how playground games get new rules.<\/p>\n<p>Have you ever noticed how your phone or computer asks for updates? Those are like <strong>special shields<\/strong> that protect you from cyber bullies!<\/p>\n<p>Let&#039;s make learning fun! We can play <strong>security games<\/strong>, watch cool videos, and even have mini-quizzes.<\/p>\n<p>Just like you level up in games, you&#039;ll become a stronger cyber defender with each lesson. Ready to be my <strong>security sidekick<\/strong>?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Q1_How_Much_Should_We_Budget_Annually_for_Employee_Cybersecurity_Training_Programs\"><\/span>Q1: How Much Should We Budget Annually for Employee Cybersecurity Training Programs?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend budgeting $500-1,000 per employee annually for <strong>cybersecurity training<\/strong>.<\/p>\n<p>Think of it like buying a shield to protect your favorite toy &#8211; it&#039;s worth spending a bit more to keep it safe!<\/p>\n<p>The cost covers <strong>fun learning tools<\/strong>, cool practice sessions, and <strong>expert teachers<\/strong>.<\/p>\n<p>I&#039;ve found smaller companies might pay less, while bigger ones often invest more.<\/p>\n<p>You&#039;ll want to include basic courses and special advanced lessons.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q2_Can_Remote_Workers_Use_Personal_Devices_While_Accessing_Company_Resources\"><\/span>Q2: Can Remote Workers Use Personal Devices While Accessing Company Resources?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend against letting <strong>remote workers<\/strong> use personal devices for company work.<\/p>\n<p>It&#039;s like letting someone borrow your favorite toy &#8211; you can&#039;t control how they&#039;ll treat it!<\/p>\n<p>Instead, I provide <strong>company-issued devices<\/strong> with proper security tools installed.<\/p>\n<p>If personal devices are absolutely necessary, I require <strong>strict security measures<\/strong>: VPN connections, updated antivirus software, and encrypted data storage.<\/p>\n<p>Think of it as putting a special lock on your digital treasure chest!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q3_What_Legal_Responsibilities_Do_Employees_Have_Regarding_Data_Breaches\"><\/span>Q3: What Legal Responsibilities Do Employees Have Regarding Data Breaches?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Let me tell you about your <strong>legal duties<\/strong> when it comes to <strong>data breaches<\/strong>!<\/p>\n<p>You&#039;re required to report any suspicious activity right away &#8211; just like telling a teacher if you see someone breaking the playground rules.<\/p>\n<p>You must follow the company&#039;s security rules and protect private information.<\/p>\n<p>If you break these rules, you could face <strong>serious consequences<\/strong>, like fines or even losing your job!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q4_How_Often_Should_Employees_Change_Their_Passwords_Across_Different_Systems\"><\/span>Q4: How Often Should Employees Change Their Passwords Across Different Systems?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend <strong>changing your passwords<\/strong> every 90 days.<\/p>\n<p>It&#039;s like getting a new secret code for your treehouse!<\/p>\n<p>Make sure you&#039;re using <strong>different passwords<\/strong> for each account &#8211; just like you wouldn&#039;t use the same key for your bike lock and your diary.<\/p>\n<p>When you pick new passwords, mix up letters, numbers, and symbols.<\/p>\n<p>Think of it as creating a <strong>special recipe<\/strong> that only you know!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q5_Should_Employees_Be_Penalized_for_Repeatedly_Failing_Security_Awareness_Tests\"><\/span>Q5: Should Employees Be Penalized for Repeatedly Failing Security Awareness Tests?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I don&#039;t believe in <strong>strict penalties<\/strong> for failed security tests. Instead, I recommend using these moments as <strong>learning opportunities<\/strong>.<\/p>\n<p>When someone struggles, I work with them to understand where they&#039;re confused and offer <strong>extra training<\/strong> that fits their needs.<\/p>\n<p>Think of it like learning to ride a bike &#8211; we don&#039;t punish falls, we help them up and show them how to balance better.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As you continue your journey towards a more secure organization, it&#039;s essential to prioritize <strong>password security<\/strong>, <strong>password management<\/strong>, and <strong>passkey management<\/strong>. Weak passwords can be an easy target for cybercriminals, making it crucial for your team to adopt <strong>strong practices<\/strong> in this area. By implementing a robust password management solution, you can significantly reduce your risk and enhance your overall cybersecurity posture.<\/p>\n<p>To take the next step in protecting your organization, we encourage you to explore the benefits of a reliable password management system. Sign up for a free account at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> today! With their user-friendly platform, you can ensure that your passwords are secure and easily managed, allowing your team to focus on their core tasks without the worry of password-related breaches. Don&#039;t wait&#x2014;secure your organization&#039;s future now!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Organize your workforce into cyber security experts with this proven training framework that transforms beginners into digital defenders.<\/p>\n","protected":false},"author":5,"featured_media":246777,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24718],"tags":[29932,22483,21134],"class_list":["post-246778","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password","tag-cyber-security-training","tag-digital-defense","tag-employee-education"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=246778"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246778\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/246777"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=246778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=246778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=246778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}