{"id":6744,"date":"2022-03-27T02:46:50","date_gmt":"2022-03-27T07:46:50","guid":{"rendered":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744"},"modified":"2022-03-29T05:30:44","modified_gmt":"2022-03-29T10:30:44","slug":"cyber-security-video-series-introduction","status":"publish","type":"post","link":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744","title":{"rendered":"Cyber Security Video Series &#8211; Introduction"},"content":{"rendered":"<p><iframe loading=\"lazy\" title=\"Cyber Security Video Series - Introduction\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/5dq98Sven3Q?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>Cyber security is a very important topic today. There are many different types of cyber security threats that are constantly being released. Some of the most common threats include malware, phishing, malware, data theft, ransomware, and more. Unfortunately, not everyone is aware of these threats and what to do about them. This blog post will help you understand the importance of cyber security and also provide some tips on how to stay safe while using your website, smartphone, or PC.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is a very important topic today. There are many different types of cyber security threats that are constantly being released. Some of the most common threats include malware, phishing, malware, data theft, ransomware, and more. Unfortunately, not everyone is aware of these threats and what to do about them. This blog post will [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":6745,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[295],"tags":[],"class_list":["post-6744","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security Video Series - Introduction | MCM Digital Products<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mcmdigitalproducts.com\/?p=6744\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Video Series - Introduction | MCM Digital Products\" \/>\n<meta property=\"og:description\" content=\"Cyber security is a very important topic today. There are many different types of cyber security threats that are constantly being released. Some of the most common threats include malware, phishing, malware, data theft, ransomware, and more. Unfortunately, not everyone is aware of these threats and what to do about them. This blog post will [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mcmdigitalproducts.com\/?p=6744\" \/>\n<meta property=\"og:site_name\" content=\"MCM Digital Products\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mcmdigitalmarketing\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-27T07:46:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-29T10:30:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2022\/03\/Cyber-Security-Video-Series-Introduction.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1275\" \/>\n\t<meta property=\"og:image:height\" content=\"1215\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ken Ivey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McmProducts\" \/>\n<meta name=\"twitter:site\" content=\"@McmProducts\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ken Ivey\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=6744#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=6744\"},\"author\":{\"name\":\"Ken Ivey\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#\\\/schema\\\/person\\\/bd0a6cbad76db9041a15de87d9ee7b40\"},\"headline\":\"Cyber Security Video Series &#8211; Introduction\",\"datePublished\":\"2022-03-27T07:46:50+00:00\",\"dateModified\":\"2022-03-29T10:30:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=6744\"},\"wordCount\":92,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=6744#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Cyber-Security-Video-Series-Introduction.png\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=6744\",\"url\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=6744\",\"name\":\"Cyber Security Video Series - Introduction | MCM Digital Products\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=6744#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=6744#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Cyber-Security-Video-Series-Introduction.png\",\"datePublished\":\"2022-03-27T07:46:50+00:00\",\"dateModified\":\"2022-03-29T10:30:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=6744#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=6744\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=6744#primaryimage\",\"url\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Cyber-Security-Video-Series-Introduction.png\",\"contentUrl\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Cyber-Security-Video-Series-Introduction.png\",\"width\":1275,\"height\":1215},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=6744#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Video Series &#8211; Introduction\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/\",\"name\":\"Michael Cummings Marketing Blog\",\"description\":\"Our Most Important Metric is Client Results\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#organization\",\"name\":\"MCM Products, LLC\",\"url\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/MCM-Sword-Green-Letters-2-1.jpg-copy-copy-1.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/MCM-Sword-Green-Letters-2-1.jpg-copy-copy-1.jpg\",\"width\":349,\"height\":142,\"caption\":\"MCM Products, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mcmdigitalmarketing\",\"https:\\\/\\\/x.com\\\/McmProducts\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#\\\/schema\\\/person\\\/bd0a6cbad76db9041a15de87d9ee7b40\",\"name\":\"Ken Ivey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a3f5c429480bd7ec822ccbc5fe598bd7e1092fd9653e84076442c1f8b377b2a6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a3f5c429480bd7ec822ccbc5fe598bd7e1092fd9653e84076442c1f8b377b2a6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a3f5c429480bd7ec822ccbc5fe598bd7e1092fd9653e84076442c1f8b377b2a6?s=96&d=mm&r=g\",\"caption\":\"Ken Ivey\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Video Series - Introduction | MCM Digital Products","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Video Series - Introduction | MCM Digital Products","og_description":"Cyber security is a very important topic today. There are many different types of cyber security threats that are constantly being released. Some of the most common threats include malware, phishing, malware, data theft, ransomware, and more. Unfortunately, not everyone is aware of these threats and what to do about them. This blog post will [&hellip;]","og_url":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744","og_site_name":"MCM Digital Products","article_publisher":"https:\/\/www.facebook.com\/mcmdigitalmarketing","article_published_time":"2022-03-27T07:46:50+00:00","article_modified_time":"2022-03-29T10:30:44+00:00","og_image":[{"width":1275,"height":1215,"url":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2022\/03\/Cyber-Security-Video-Series-Introduction.png","type":"image\/png"}],"author":"Ken Ivey","twitter_card":"summary_large_image","twitter_creator":"@McmProducts","twitter_site":"@McmProducts","twitter_misc":{"Written by":"Ken Ivey"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744#article","isPartOf":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744"},"author":{"name":"Ken Ivey","@id":"https:\/\/blog.mcmdigitalproducts.com\/#\/schema\/person\/bd0a6cbad76db9041a15de87d9ee7b40"},"headline":"Cyber Security Video Series &#8211; Introduction","datePublished":"2022-03-27T07:46:50+00:00","dateModified":"2022-03-29T10:30:44+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744"},"wordCount":92,"publisher":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/#organization"},"image":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744#primaryimage"},"thumbnailUrl":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2022\/03\/Cyber-Security-Video-Series-Introduction.png","articleSection":["Website Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744","url":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744","name":"Cyber Security Video Series - Introduction | MCM Digital Products","isPartOf":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744#primaryimage"},"image":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744#primaryimage"},"thumbnailUrl":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2022\/03\/Cyber-Security-Video-Series-Introduction.png","datePublished":"2022-03-27T07:46:50+00:00","dateModified":"2022-03-29T10:30:44+00:00","breadcrumb":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mcmdigitalproducts.com\/?p=6744"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744#primaryimage","url":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2022\/03\/Cyber-Security-Video-Series-Introduction.png","contentUrl":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2022\/03\/Cyber-Security-Video-Series-Introduction.png","width":1275,"height":1215},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=6744#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.mcmdigitalproducts.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Video Series &#8211; Introduction"}]},{"@type":"WebSite","@id":"https:\/\/blog.mcmdigitalproducts.com\/#website","url":"https:\/\/blog.mcmdigitalproducts.com\/","name":"Michael Cummings Marketing Blog","description":"Our Most Important Metric is Client Results","publisher":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mcmdigitalproducts.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.mcmdigitalproducts.com\/#organization","name":"MCM Products, LLC","url":"https:\/\/blog.mcmdigitalproducts.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mcmdigitalproducts.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2024\/04\/MCM-Sword-Green-Letters-2-1.jpg-copy-copy-1.jpg","contentUrl":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2024\/04\/MCM-Sword-Green-Letters-2-1.jpg-copy-copy-1.jpg","width":349,"height":142,"caption":"MCM Products, LLC"},"image":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mcmdigitalmarketing","https:\/\/x.com\/McmProducts"]},{"@type":"Person","@id":"https:\/\/blog.mcmdigitalproducts.com\/#\/schema\/person\/bd0a6cbad76db9041a15de87d9ee7b40","name":"Ken Ivey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a3f5c429480bd7ec822ccbc5fe598bd7e1092fd9653e84076442c1f8b377b2a6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a3f5c429480bd7ec822ccbc5fe598bd7e1092fd9653e84076442c1f8b377b2a6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3f5c429480bd7ec822ccbc5fe598bd7e1092fd9653e84076442c1f8b377b2a6?s=96&d=mm&r=g","caption":"Ken Ivey"}}]}},"_links":{"self":[{"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/posts\/6744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6744"}],"version-history":[{"count":3,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/posts\/6744\/revisions"}],"predecessor-version":[{"id":6792,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/posts\/6744\/revisions\/6792"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/media\/6745"}],"wp:attachment":[{"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}