itsecurity.uiowa.edu/awareness

Preview meta tags from the itsecurity.uiowa.edu website.

Linked Hostnames

5

Thumbnail

Search Engine Appearance

Google

https://itsecurity.uiowa.edu/awareness

Awareness

Awareness training Data types and regulations Handling and responding to a compromise Prohibited technology Protecting your personal computer Remote work Solutions to detect, protect and remove malware



Bing

Awareness

https://itsecurity.uiowa.edu/awareness

Awareness training Data types and regulations Handling and responding to a compromise Prohibited technology Protecting your personal computer Remote work Solutions to detect, protect and remove malware



DuckDuckGo

https://itsecurity.uiowa.edu/awareness

Awareness

Awareness training Data types and regulations Handling and responding to a compromise Prohibited technology Protecting your personal computer Remote work Solutions to detect, protect and remove malware

  • General Meta Tags

    18
    • title
      Awareness | IT Security - The University of Iowa
    • title
      University of Iowa
    • title
      University of Iowa
    • charset
      utf-8
    • description
      Awareness training Data types and regulations Handling and responding to a compromise Prohibited technology Protecting your personal computer Remote work Solutions to detect, protect and remove malware
  • Open Graph Meta Tags

    5
    • og:site_name
      IT Security - The University of Iowa
    • og:url
      https://itsecurity.uiowa.edu/awareness
    • og:title
      Awareness
    • og:description
      Awareness training Data types and regulations Handling and responding to a compromise Prohibited technology Protecting your personal computer Remote work Solutions to detect, protect and remove malware
    • og:image:url
      https://itsecurity.uiowa.edu/sites/itsecurity.uiowa.edu/files/styles/large/public/2023-02/Catlett%20and%20IATL01.png?itok=pzwZ_7gQ
  • Twitter Meta Tags

    4
    • twitter:card
      summary_large_image
    • twitter:title
      Awareness
    • twitter:description
      Awareness training Data types and regulations Handling and responding to a compromise Prohibited technology Protecting your personal computer Remote work Solutions to detect, protect and remove malware
    • twitter:image
      https://itsecurity.uiowa.edu/sites/itsecurity.uiowa.edu/files/styles/large/public/2023-02/Catlett%20and%20IATL01.png?itok=pzwZ_7gQ
  • Link Tags

    42
    • apple-touch-icon
      /profiles/custom/sitenow/assets/apple-touch-icon-60x60.png
    • apple-touch-icon
      /profiles/custom/sitenow/assets/apple-touch-icon-72x72.png
    • apple-touch-icon
      /profiles/custom/sitenow/assets/apple-touch-icon-76x76.png
    • apple-touch-icon
      /profiles/custom/sitenow/assets/apple-touch-icon-114x114.png
    • apple-touch-icon
      /profiles/custom/sitenow/assets/apple-touch-icon-120x120.png

Links

19