{"id":951,"date":"2020-05-04T15:57:02","date_gmt":"2020-05-04T15:57:02","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=951"},"modified":"2021-01-18T08:29:14","modified_gmt":"2021-01-18T08:29:14","slug":"dod-cyber-awareness-challenge-2020-your-ultimate-guide","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/","title":{"rendered":"DoD Cyber Awareness Challenge 2020 \u2014 Your Ultimate Guide"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Here are some of the key takeaways for companies and individuals from the DoD Cyber Awareness Challenge 2020<\/h2>\n\n\n\n<p>The Cyber Awareness Challenge, which is also known as the <strong>Army Cyber Awareness Training, the cyber awareness challenge <\/strong>or<strong> the DOD cyber challenge<\/strong>, is an annual computer security training that was created to increase cyber awareness among Department of Defense (DoD) employees. <\/p>\n\n\n\n<p>It\u2019s <strong>available online<\/strong>, it\u2019s <strong>free of cost<\/strong> for everyone, and it\u2019s also accessible from <strong>any part of the world<\/strong> so long as you have a reliable internet connection! <\/p>\n\n\n\n<p>Everyone with a computer or that handles any type of sensitive information would benefit from it. In this guide, we\u2019ll explore the key lessons of the DoD cyber challenge and the summary of the entire training materials. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DoD Cyber Awareness Challenge: Who Can Take It?<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Army, other armed force branches<\/strong>,<strong> government employees<\/strong>.<\/li><li><strong>Companies and organizations<\/strong> can use this cyber awareness challenge as an excellent resource to provide cybersecurity training to their employees.<\/li><li><strong>All individuals<\/strong> \u2014 especially those who value privacy and security, who work with sensitive information, or those who work in the IT field \u2014 should take this training to protect themselves and their clients from potential cyber-attacks.&nbsp;<\/li><\/ul>\n\n\n\n<p>You can complete this cyber awareness challenge training on the official <a rel=\"noreferrer noopener\" href=\"https:\/\/dl.dod.cyber.mil\/wp-content\/uploads\/trn\/online\/cyber-awareness-challenge\/launchPage.htm\" target=\"_blank\">DoD Cyber Awareness Challenge 2020 website.<\/a><\/p>\n\n\n\n<p>Even though its lessons are focusing on securing the nation&#8217;s classified data, the cyber awareness challenge contains lots of cybersecurity takeaway for non-military users like you and me.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Format and Main Content of the DoD Cyber Awareness Challenge<\/h2>\n\n\n\n<p>There are three main sections and their subsections in the DoD Cyber Awareness Challenge tutorials:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"732\" height=\"302\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/05\/dod-cyber-awareness-challenge-categories.png\" alt=\"Categories of the DoD Cyber Awareness Challenge tutorials\" class=\"wp-image-954 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/05\/dod-cyber-awareness-challenge-categories.png 732w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/05\/dod-cyber-awareness-challenge-categories-300x124.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/05\/dod-cyber-awareness-challenge-categories-560x231.png 560w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\" \/><\/figure><\/div>\n\n\n\n<p>Each section has definitions, vulnerabilities, real-life scenarios, and talks about the types of decisions you should make or avoid to prevent a <a href=\"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/\">cyber attack<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1) Data Spillage<\/h3>\n\n\n\n<p>In the government, \u201c<a href=\"https:\/\/files.nc.gov\/ncdit\/documents\/files\/Statewide-Glossary-2018.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">spillage<\/a>\u201d is a term that refers to information that\u2019s leaked from a higher classification or protection level to a lower one. A spillage poses a serious risk to national security. Spillage occurs when someone accidentally or intentionally makes an unauthorized data disclosure, data modification, or engages in espionage, which results in loss or degradation of resources or capabilities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2) Sensitive Information<\/h3>\n\n\n\n<p>For any type of business or organization that handles sensitive information, it\u2019s crucial that you do everything you can to protect this information \u2014 both for the sake of your customers as well as to remain compliant with laws and regulatory data protection requirements. Some of these regulations include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The <a href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/ocr\/privacy\/hipaa\/administrative\/combined\/hipaa-simplification-201303.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Health Insurance Portability and Accountability Act<\/a> (HIPAA),<\/li><li>The European Union\u2019s <a href=\"https:\/\/gdpr-info.eu\/\" target=\"_blank\" rel=\"noreferrer noopener\">General Data Protection Regulation<\/a> (GDPR),<\/li><li>The <a href=\"http:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?lawCode=CIV&amp;division=3.&amp;title=1.81.5.&amp;part=4.&amp;chapter=&amp;article=\" target=\"_blank\" rel=\"noreferrer noopener\">California Consumer Privacy Act<\/a> (CCPA), and<\/li><li>The <a href=\"https:\/\/sectigostore.com\/blog\/what-is-pci-dss-a-quick-guide-to-the-12-pci-dss-requirements\/\">Payment Card Industry Data Security Standards<\/a> (PCI DSS), etc.&nbsp;<\/li><\/ul>\n\n\n\n<p>But what is considered \u201csensitive information?\u201d Sensitive information includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Controlled technical information (CTI),<\/li><li>Personally identifiable information (PII),<\/li><li>Protected health information (PHI),<\/li><li>Financial information,<\/li><li>Personal or payroll information, <\/li><li>For official use only (FOUO),<\/li><li>Controlled unclassified information (CUI), and<\/li><li>Proprietary data.<\/li><\/ul>\n\n\n\n<p>These types of sensitive information must be protected because their leakage can compromise government missions or interests. An example of such sensitive information includes data or information that\u2019s provided by a confidential source (person, commercial business, or foreign government) with the condition it would not be released.<\/p>\n\n\n\n<p>For businesses and healthcare organizations, examples of these types of information include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Employee or customers\u2019 names, addresses, phone numbers, etc.,<\/li><li>Financial records and account information,<\/li><li>User credentials and passwords,<\/li><li>Patient medical records and health-related information, and<\/li><li>Medicare or insurance information.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3) Malicious Code<\/h3>\n\n\n\n<p>Malicious code can be spread by downloading corrupted email attachments and files or visiting infected websites. Malicious code includes viruses, trojan horses, worms, macros, and scripts. They can damage or compromise digital files, erase your hard drive and\/or allow hackers access to your PC or mobile from a remote location.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Lessons for Corporations and Individuals from the DoD Cyber Awareness Challenge<\/h2>\n\n\n\n<p>Here, we have written a summary of cyber awareness challenge training, covering the key takeaway lessons. <\/p>\n\n\n\n<p>Please note that we have included only handpicked the lessons which we deem beneficial to a general audience. It doesn&#8217;t have all the teachings of the course, though. To get access to all of that, you must complete the DoD Cyber Awareness Challenge yourself!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Protection Against Malicious Code<\/h3>\n\n\n\n<p><a href=\"https:\/\/usa.kaspersky.com\/resource-center\/definitions\/malicious-code\" target=\"_blank\" rel=\"noreferrer noopener\">Malicious code<\/a> is a term that describes the code that\u2019s used in online forms, scripts, and software that aims to cause harm in some way. To help your employees avoid the risks associated with downloading and installing malicious code, here are some helpful tips:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Scan all external files before uploading them to your computer.<\/li><li>Don\u2019t access website links, buttons, and\/or graphics in a suspected email or a pop-up generated by an email message.<\/li><li>If you suspect any email to be malicious or if any unknown\/unauthorized sender is requesting some personal\/sensitive information, contact your security point of contact (POC) or help desk for assistance.<\/li><li>For your personal and office devices (laptop, PC, mobile, etc.), research any application and its vulnerabilities before downloading that it.<\/li><li>View email in plain text and don&#8217;t view an email in the preview pane.<\/li><li>Look for digital signatures if your organization uses an <a href=\"https:\/\/sectigostore.com\/id\/email-signing-certificate\">email signing certificate<\/a> (highly recommended). Digitally signed emails are considered more secure.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Best Practices for Protecting Sensitive Information<\/h3>\n\n\n\n<p>When you trust your employees to handle customers\u2019 confidential information, they must be aware of the sensitivity of the data and how to protect them. A single act of negligence can be catastrophic. Here are some major takeaways from cyber awareness challenge that you can use to train employees.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>While faxing sensitive information, ensure the recipient is at the receiving end. Contact the recipient to confirm receipt.<\/li><li>The most commonly reported cause of PII breaches is a failure to encrypt email messages containing PII. So always use encryption when emailing PII, PHI, or any other sensitive information. Also, digitally signed emails whenever possible to provide authentication and to assure information integrity.<\/li><li>Avoid storing sensitive information in shared folders or shared applications (e.g., SharePoint, Google Docs, etc.).<\/li><li>Never use personal email accounts for transmitting PII and PHI.<\/li><li>Store sensitive data only on authorized information systems. Don&#8217;t transmit, store, or process confidential information on non-authorized systems.<\/li><li>Follow your organization\u2019s policy concerning the retention or disposal of sensitive information.<\/li><li>Mobile devices may be hacked or infected with malware. So, always use mobile devices approved by your organization and follow your organization\u2019s policies on the use of mobile computing devices and encryption while dealing with PII or PHI.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Prevention Against Insider Threats<\/h3>\n\n\n\n<p>Incidents related to insider threats are up 47% since 2018, according to <a href=\"https:\/\/www.observeit.com\/cost-of-insider-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">data from the Ponemon Institute and ObserveIT<\/a>.<\/p>\n\n\n\n<p>The term <a href=\"https:\/\/www.thesslstore.com\/blog\/what-is-an-insider-threat-definition-examples-statistics-to-consider\/\" target=\"_blank\" rel=\"noreferrer noopener\">insider threat<\/a> refers to a situation where employees themselves (intentionally or unintentionally) leak the data or execute the cybercrime against the organization. You can\u2019t rule out the possibility of insider threats because employees have tons of information readily available to them on their fingertips. So, as an employer, you must keep an eye on your employees\u2019 activities and also train the staff to recognize the potential threat that may exist among them. We\u2019re not saying that all of your employees are insider threats. However, if someone is going through difficult life circumstances or experiencing persistent interpersonal difficulties, their emotional instability can make them a potential candidate to become one. Observe them and assess whether they\u2019re showing any uncommon or concerning behaviors, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Showing hostile, vindictive or criminal behavior, or<\/li><li>Taking an unusual, or excessive interest in sensitive information or<\/li><li>Indicating unexplained or sudden affluence by purchases of high-value items\/living beyond one&#8217;s means or<\/li><li>Attempting to access and\/or remove sensitive information without the need-to-know<\/li><\/ul>\n\n\n\n<p>Rather than giving the benefit of the doubt, report any suspicious activity or behavior in accordance with your agency\u2019s insider threat policy.<\/p>\n\n\n\n<p>Of course, there are additional steps you can take to prevent or limit the impact of insider threats:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Perform organization-wide risk assessments.<\/li><li>Create and enforce a data use policy.<\/li><li>Implement the principle of least privilege to limit employee access to only necessary systems.<\/li><li>Periodically review access lists and remove access immediately for employees who quit or are fired.<\/li><li>Use a security information and event system (SIEM) to monitor employees\u2019 actions and the information they access.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Best Practices for Physical Security in the Workplace<\/h3>\n\n\n\n<p>There are many reasons why <a href=\"https:\/\/www.dm.usda.gov\/physicalsecurity\/workplace.htm\" target=\"_blank\" rel=\"noreferrer noopener\">physical security<\/a> is so important to organizations \u2014 your colleague could be an insider threat, or some walk-ins or visitors might be spying, eavesdropping or looking for a chance to steal the important data from the files or computer. These occurrences not only happen on military installations but also within the organizations. So, you must be vigilant about your workplace security, too. This means:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Don\u2019t talk about work\/customers\/company\u2019s policies regarding marketing, technology, etc. outside your workspace. You might unintentionally leak some confidential information that must not go out. Even inside a closed work environment, be careful when discussing sensitive information, such as PII or PHI, as people without a need-to-know may be present around you.<\/li><li>Be aware of people eavesdropping when retrieving messages from smartphones or other media.<\/li><li>Know and follow your organization\u2019s policy on gaining entry in the building, securing work area, and responding to emergencies.<\/li><li>Always lock your office\u2019s cabinets and drawers if they are having any files\/papers containing sensitive information.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Best Practices for Portable Devices and Removable Media<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.us-cert.gov\/sites\/default\/files\/publications\/RisksOfPortableDevices.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Portable devices<\/a> and removable media pose a major security threat to businesses and government organizations alike. They\u2019re easy to use and convenient. However, portable devices also can carry malware from one device to another without the user knowing. So, if you plug an infected device into a new machine, it may install that malware on the new device.<\/p>\n\n\n\n<p>These types of media include flash media, such as thumb drives, memory sticks, and flash drives, external hard drives, optical discs, and external music players like iPods.<\/p>\n\n\n\n<p>So, what can you do to protect your organization?<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Only use removable media to store work-related data when operationally necessary, owned by your organization, and approved by the appropriate authority in accordance with policy.<\/li><li>Encrypt data appropriately when storing it in a removable media device.<\/li><li>Do not use any personally owned\/non-organizational removable media to store your organization\u2019s data.<\/li><li>As a best practice, label all removable media, especially if they contain PII, or PHI, or any sensitive data.<\/li><li>Avoid inserting removable media with unknown content into your computer.<\/li><li>Follow your organization\u2019s policy for sanitizing, purging, discarding, and destroying removable media<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Best Practices for Laptops and Mobile Devices<\/h3>\n\n\n\n<p>Your laptop and mobile devices must have stored so many saved credentials for automatic login, personal and professional data and media files. If your organization has provided you laptop or mobile for profession use, it might be a virtual goldmine for attackers. Just by hacking or stealing such devices, the cybercriminal can execute dangerous attacks. That\u2019s why handing your mobile and laptop carefully is a crucial step.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Consider screen protection if you are using a laptop or mobile device for doing office work in public places.<\/li><li>Power off the device if you are not going to use it in the immediate future.<\/li><li>Enable automatic screen locking after a period of inactivity.<\/li><li>Encrypt all sensitive data on laptops\/mobile.<\/li><li>Always maintain visual or physical control of your laptop\/mobile devices, especially when going through airport security checkpoints.<\/li><li>Use public or free Wi-Fi only with the organization\u2019s approved VPN.<\/li><li>If the device is lost or stolen, immediately report the loss to your security POC or organization\u2019s technology department.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Tips for Home Computer Security<\/h3>\n\n\n\n<p>People generally don\u2019t store organization related information in their home computer\/personal computer. However, such personal computers do contain automatic login facilities to email addresses, social media sites, applications, financial institutions\u2019 sites, etc. Hence, the employees must be aware of how to protect their home computers, too.<\/p>\n\n\n\n<p>Note: In the cyber awareness challenge, these tips are derived from the National Security Agency (NSA)&#8217;s PDF &#8220;<a href=\"https:\/\/media.defense.gov\/2019\/Jul\/16\/2002158056\/-1\/-1\/0\/CSI-BEST-PRACTICES-FOR-KEEPING-HOME-NETWORK-SECURE.PDF\" target=\"_blank\" rel=\"noreferrer noopener\">Best Practices for Keeping Your Home Network Secure<\/a>.\u201d<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Always use strong passwords for your home computer.<\/li><li>Create separate accounts for each user and have them create their own passwords using a strong password creation method.<\/li><li>Install all system security updates, patches, and keep your defenses such as antivirus software, spyware, and firewall up to date.<\/li><li>Regularly scan files for viruses.<\/li><li>Change default login ID and passwords for operating systems and applications.<\/li><li>Regularly back up and securely store your files.<\/li><\/ul>\n\n\n\n<p>Beware of sudden flashing pop-ups warning that your computer is infected with a virus; this might indicate a malicious code attack. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">General Security Tips for Online Behavior Outside the Workplace<\/h3>\n\n\n\n<p>While employers can\u2019t necessarily control what their employees do in their personal time, they can educate them about the dangers of social media and other online platforms. The DoD Cyber Awareness Challenge has a section that provides guidance on the best practices while surfing online.<\/p>\n\n\n\n<p>Here are a few key takeaways from this section of the DoD cyber awareness challenge training:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Be aware of the information you post online about yourself and your family. It might be used to guess your passwords, executing <a href=\"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/\">doxxing attacks<\/a>, sending spear\/<a href=\"https:\/\/sectigostore.com\/blog\/whale-of-an-attack-a-guide-to-business-email-compromise\/\">whale phishing<\/a> emails, or for identity theft.<\/li><li>Create strong passwords and opt for <a href=\"https:\/\/sectigostore.com\/blog\/what-is-multi-factor-authentication-and-how-does-it-differ-from-2fa-sfa\/\">two-factor authentication (2FA) or multi-factor authentication (MFA)<\/a>, if available.<\/li><li>Beware of links to games, quizzes, and other applications available through social networking services. They might contain malicious codes or manipulate you to share your login credentials or other sensitive information.<\/li><li>Don\u2019t post any confidential information about your organization, colleagues, or customers on social networking sites (no matter what privacy settings you have set on your account).<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">A Final Word on the DoD Cyber Awareness Challenge<\/h2>\n\n\n\n<p>Cybercriminals use innovative and sophisticated ways to execute <a class=\"wpil_keyword_link\" href=\"https:\/\/sectigostore.com\/blog\/10-different-types-of-cyber-attacks-how-they-work\/\" title=\"cyber attacks\" data-wpil-keyword-link=\"linked\">cyber attacks<\/a> nowadays. People do fall for such malicious tricks and lose billions of dollars every year. That&#8217;s why cyber awareness training is a must for everyone, especially for corporate employees and people working in the field of technology.<\/p>\n\n\n\n<p>When corporations become a victim of a cyber attack due to the negligence of an employee or insider threats, they lose not only sensitive data but also the reputation and suffer from financial loss in legal battles.&nbsp; As such, the DoD Cyber Awareness Challenge is an excellent resource for organizations to train their employees, make them vigilant against various types of cyber crimes, and let them know the best protection techniques. The cyber awareness challenge is a highly recommended training for all for improving the security posture of any organization regardless of size.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here are some of the key takeaways for companies and individuals from the DoD Cyber Awareness Challenge 2020 The Cyber Awareness Challenge, which is also known as the Army Cyber&#8230;<\/p>\n","protected":false},"author":6,"featured_media":952,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[66,65],"class_list":["post-951","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cyber-awareness","tag-dod-cyber-awareness-challenge","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DoD Cyber Awareness Challenge 2020 \u2014 Your Ultimate Guide - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"The DoD Cyber Awareness Challenge is an unclassified training that helps government &amp; business employees be more security-minded. Here&#039;s what to know...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DoD Cyber Awareness Challenge 2020 \u2014 Your Ultimate Guide - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"The DoD Cyber Awareness Challenge is an unclassified training that helps government &amp; business employees be more security-minded. Here&#039;s what to know...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-04T15:57:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-18T08:29:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/05\/dod-cyber-awareness-challenge.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1602\" \/>\n\t<meta property=\"og:image:height\" content=\"1001\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Medha Mehta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Medha Mehta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/\"},\"author\":{\"name\":\"Medha Mehta\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"headline\":\"DoD Cyber Awareness Challenge 2020 \u2014 Your Ultimate Guide\",\"datePublished\":\"2020-05-04T15:57:02+00:00\",\"dateModified\":\"2021-01-18T08:29:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/\"},\"wordCount\":2430,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/dod-cyber-awareness-challenge.jpg\",\"keywords\":[\"cyber awareness\",\"DoD Cyber Awareness Challenge\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/\",\"name\":\"DoD Cyber Awareness Challenge 2020 \u2014 Your Ultimate Guide - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/dod-cyber-awareness-challenge.jpg\",\"datePublished\":\"2020-05-04T15:57:02+00:00\",\"dateModified\":\"2021-01-18T08:29:14+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"description\":\"The DoD Cyber Awareness Challenge is an unclassified training that helps government & business employees be more security-minded. Here's what to know...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/dod-cyber-awareness-challenge.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/dod-cyber-awareness-challenge.jpg\",\"width\":1602,\"height\":1001},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DoD Cyber Awareness Challenge 2020 \u2014 Your Ultimate Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\",\"name\":\"Medha Mehta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"caption\":\"Medha Mehta\"},\"description\":\"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.\",\"sameAs\":[\"https:\\\/\\\/sectigostore.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DoD Cyber Awareness Challenge 2020 \u2014 Your Ultimate Guide - InfoSec Insights","description":"The DoD Cyber Awareness Challenge is an unclassified training that helps government & business employees be more security-minded. Here's what to know...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/","og_locale":"en_US","og_type":"article","og_title":"DoD Cyber Awareness Challenge 2020 \u2014 Your Ultimate Guide - InfoSec Insights","og_description":"The DoD Cyber Awareness Challenge is an unclassified training that helps government & business employees be more security-minded. Here's what to know...","og_url":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/","og_site_name":"InfoSec Insights","article_published_time":"2020-05-04T15:57:02+00:00","article_modified_time":"2021-01-18T08:29:14+00:00","og_image":[{"width":1602,"height":1001,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/05\/dod-cyber-awareness-challenge.jpg","type":"image\/jpeg"}],"author":"Medha Mehta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Medha Mehta","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/"},"author":{"name":"Medha Mehta","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"headline":"DoD Cyber Awareness Challenge 2020 \u2014 Your Ultimate Guide","datePublished":"2020-05-04T15:57:02+00:00","dateModified":"2021-01-18T08:29:14+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/"},"wordCount":2430,"commentCount":0,"image":{"@id":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/05\/dod-cyber-awareness-challenge.jpg","keywords":["cyber awareness","DoD Cyber Awareness Challenge"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/","url":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/","name":"DoD Cyber Awareness Challenge 2020 \u2014 Your Ultimate Guide - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/05\/dod-cyber-awareness-challenge.jpg","datePublished":"2020-05-04T15:57:02+00:00","dateModified":"2021-01-18T08:29:14+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"description":"The DoD Cyber Awareness Challenge is an unclassified training that helps government & business employees be more security-minded. Here's what to know...","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/05\/dod-cyber-awareness-challenge.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/05\/dod-cyber-awareness-challenge.jpg","width":1602,"height":1001},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/dod-cyber-awareness-challenge-2020-your-ultimate-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DoD Cyber Awareness Challenge 2020 \u2014 Your Ultimate Guide"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15","name":"Medha Mehta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","caption":"Medha Mehta"},"description":"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.","sameAs":["https:\/\/sectigostore.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=951"}],"version-history":[{"count":10,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/951\/revisions"}],"predecessor-version":[{"id":2263,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/951\/revisions\/2263"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/952"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}