{"id":195,"date":"2024-09-24T02:57:16","date_gmt":"2024-09-24T02:57:16","guid":{"rendered":"https:\/\/division.iium.edu.my\/itd-devel\/?page_id=195"},"modified":"2026-02-12T08:04:32","modified_gmt":"2026-02-12T08:04:32","slug":"cybersecurity-and-email","status":"publish","type":"page","link":"https:\/\/division.iium.edu.my\/itd\/cybersecurity-and-email\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"195\" class=\"elementor elementor-195\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2a4b6d4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2a4b6d4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a329b0\" data-id=\"4a329b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a3d11ca elementor-widget elementor-widget-image\" data-id=\"a3d11ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1414\" height=\"1512\" src=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2026\/02\/CYBERSECURITY-EMAIL-MANAGEMENT-SECTION-1.png\" class=\"attachment-1536x1536 size-1536x1536 wp-image-12248\" alt=\"\" srcset=\"https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2026\/02\/CYBERSECURITY-EMAIL-MANAGEMENT-SECTION-1.png 1414w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2026\/02\/CYBERSECURITY-EMAIL-MANAGEMENT-SECTION-1-281x300.png 281w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2026\/02\/CYBERSECURITY-EMAIL-MANAGEMENT-SECTION-1-958x1024.png 958w, https:\/\/division.iium.edu.my\/itd\/wp-content\/uploads\/sites\/16\/2026\/02\/CYBERSECURITY-EMAIL-MANAGEMENT-SECTION-1-768x821.png 768w\" sizes=\"(max-width: 1414px) 100vw, 1414px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":37,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":{"1":"page","2":"type-page","3":"status-publish","4":"hentry"},"_links":{"self":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages\/195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/comments?post=195"}],"version-history":[{"count":215,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages\/195\/revisions"}],"predecessor-version":[{"id":12251,"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/pages\/195\/revisions\/12251"}],"wp:attachment":[{"href":"https:\/\/division.iium.edu.my\/itd\/wp-json\/wp\/v2\/media?parent=195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}