{"id":1035,"date":"2020-04-21T09:24:34","date_gmt":"2020-04-21T13:24:34","guid":{"rendered":"http:\/\/sites.scranton.edu\/itmatters\/?p=1035"},"modified":"2020-04-21T15:29:29","modified_gmt":"2020-04-21T19:29:29","slug":"securely-sharing-files-with-restricted-data","status":"publish","type":"post","link":"https:\/\/sites.scranton.edu\/itmatters\/2020\/04\/21\/securely-sharing-files-with-restricted-data\/","title":{"rendered":"Securely Sharing Files with Restricted Data"},"content":{"rendered":"<p>Although email is a useful and necessary means of communicating, it is not necessarily the most secure method for sharing important or sensitive documents. For example, an email does not simply go from the sender to the recipient instantaneously. Most emails have to travel across multiple networks and servers before arriving in their intended audience\u2019s inbox. These pause points expose emails to attack, usually due to unsecured networks, vulnerable servers, and the people savvy enough to hack them.<\/p>\n<p>The Division of Information Technology recommends that you share specific documents or entire folders using OneDrive (and\/or SharePoint). You can review and edit permissions at any time.<\/p>\n<p><a href=\"https:\/\/livescranton.sharepoint.com\/:b:\/r\/sites\/adhoc_itresources\/Shared%20Documents\/Training%20Documentation\/securely-send-files.pdf?csf=1&amp;web=1&amp;e=y7TJYM\" target=\"_blank\" rel=\"noopener noreferrer\">Click here to view entire recommendation and step-by-step instructions.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Although email is a useful and necessary means of communicating, it is not necessarily the most secure method for sharing important or sensitive documents. For example, an email does not simply go from the sender to the recipient instantaneously. Most emails have to travel across multiple networks and servers before arriving in their intended audience\u2019s [&hellip;]<\/p>\n","protected":false},"author":258,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35,43,46],"tags":[],"class_list":["post-1035","post","type-post","status-publish","format-standard","hentry","category-it-news","category-it-training","category-security"],"_links":{"self":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts\/1035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/users\/258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/comments?post=1035"}],"version-history":[{"count":1,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts\/1035\/revisions"}],"predecessor-version":[{"id":1036,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/posts\/1035\/revisions\/1036"}],"wp:attachment":[{"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/media?parent=1035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/categories?post=1035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.scranton.edu\/itmatters\/wp-json\/wp\/v2\/tags?post=1035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}