{"id":9834,"date":"2015-12-08T12:22:03","date_gmt":"2015-12-08T19:22:03","guid":{"rendered":"https:\/\/speeches.byu.edu\/?post_type=speech&p=9834"},"modified":"2022-03-03T08:24:09","modified_gmt":"2022-03-03T15:24:09","slug":"cybersecurity-and-spiritual-safety","status":"publish","type":"speech","link":"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/","title":{"rendered":"Cybersecurity and Spiritual Safety"},"content":{"rendered":"

Good morning. I am honored to have the chance to speak to you today.<\/p>\n

As you probably know, we are under attack by hackers and others seeking to steal our online identities or information. Some attacks in the news recently included Target, Home Depot, Sony, and the IRS. In one of the largest attacks, the U.S. Office of Personnel Management reported the theft of sensitive information from twenty-two million people\u2014virtually anyone who had undergone a government background check in the last fifteen years. In addition, there are lots of online scams just waiting to trap us.<\/p>\n

We are also under spiritual attack. As stated in 2 Nephi 2:27, Satan and his followers are doing everything that is possible to make us \u201cmiserable like unto\u201d them. Brigham Young said:<\/p>\n

It was revealed to me in the commencement of this Church, that the Church would spread, prosper, grow and extend, and that in proportion to the spread of the Gospel among the nations of the earth, so would the power of Satan rise<\/i>.1<\/sup><\/p>\n

Recently President Thomas S. Monson stated, \u201cWhere once the standards of the Church and the standards of society were mostly compatible, now there is a wide chasm between us, and it\u2019s growing ever wider.\u201d2<\/sup> However, as threatening as this may seem, we also have been promised spiritual protection. Today I am going to speak about some ways to improve our computer-security behavior, and I am going to offer some spiritual-behavior tips to keep us safe spiritually. While neither of these lists is complete, they are a good place to start.<\/p>\n

Security Warnings and Habituation<\/b><\/h2>\n

As was mentioned, I am a professor in the Information Systems Department. I do research at the intersection of neuroscience and behavioral information security. Basically, my research team and I study what is going on in people\u2019s brains when they are interacting with security messages.<\/p>\n

We have discovered some interesting things about how and why people behave the way they do in a computer-security setting. Our research shows that when computer users are exposed to a security message more than once, on the second\u2014and on any following\u2014\u00adrepetition, the brain saves energy by relying on memory rather than visually processing that security message on subsequent viewings.<\/p>\n

The region at the back of the brain, called the occipital lobe, is responsible for visual processing and is one of the main areas in which we saw a decreased response over the repetitions. As you can guess, this is problematic because we are tuning out these messages without really seeing them. We have developed some variations on the security messages, and these variations cause the computer users\u2019 brains to pay attention. In this way\u2014working with<\/i> biology instead of against it\u2014we can make users more secure by changing the software rather than by increasing the training for users.<\/p>\n

In a sense, this habituation to security \u00admessages is like disregarding the \u00adpromptings of the Holy Ghost. If we don\u2019t act on the promptings of the Holy Ghost, it can be harder for us to be aware of future promptings. We might even tune out the still small voice.<\/p>\n

Elder Ronald T. Halverson said:<\/p>\n

Many of us get so involved in our day-to-day tasks and worldly pursuits that we do not notice the many small miracles that constantly occur around us. This is one reason we may lose contact with the Holy Spirit and lose awareness of His promptings.<\/i> .<\/i> .<\/i> .<\/i><\/p>\n

. . . The Lord knows that unless we keep the commandments and pray daily and read the scriptures, the world and its influences can pull us away from the strait and narrow path and dull our senses to the whisperings of the Spirit.<\/i>3<\/sup><\/p>\n

We must be spiritually in tune in order to recognize and be obedient to promptings when they come. We can spiritually prepare ourselves to receive and then respond to promptings of the Spirit in every situation. When we keep the commandments, He will tell us in our minds and hearts what we should do so that we can know the direction we need to go in our lives. \u201cBy the power of the Holy Ghost [we] may know the truth of all things.\u201d4<\/sup><\/p>\n

For most of us, it is not always easy to discern the whisperings of the Spirit, so it is something we need to work on daily. Through obedience we can receive protection, blessings, and insights.<\/p>\n

Phishing<\/b><\/h2>\n

Computer users may receive emails that seem legitimate but are not. These are called phishing emails. They tend to offer some unearned benefit or may even trick us into providing information to fix a perceived mistake. Certainly most of us have heard of the Nigerian prince who just needs a little investment from us to be able to rescue his great wealth.<\/p>\n

What is trickier, however, is the email that looks like it is from our bank or a company from which we purchased something online. Phishing email messages often include official-looking logos from real organizations and other identifying information taken directly from legitimate websites.<\/p>\n

My colleagues and I did some research examining phishing emails. We used eye-tracking technology to capture what specific parts of the email messages the participants noticed. Unfortunately, most of our participants did not notice the suspicious parts of these emails.<\/p>\n

Following are some best practices for avoiding being phished:<\/p>\n

    \n
  • Don\u2019t click on links in email messages.<\/li>\n
  • Type addresses directly into your browser or use your personal bookmarks.<\/li>\n
  • Check the security certificate before entering personal or financial information into a website.<\/li>\n
  • Don\u2019t enter personal or financial information into pop-up windows.<\/li>\n
  • Learn to identify suspected phishing emails\u2014watch for gifts or the loss of an existing account.<\/li>\n
  • Check the source of information.<\/li>\n<\/ul>\n

    Similarly, in today\u2019s world we are faced with all kinds of counterfeit happiness. It is so easy to become distracted and waste our precious time on mindless entertainment rather than to be engaged in worthwhile activities, such as scripture study or temple attendance.<\/p>\n

    President Dieter F. Uchtdorf said:<\/p>\n

    One of the adversary\u2019s methods to prevent us from progressing is to confuse us about who we really are and what we really desire.<\/i><\/p>\n

    We want to spend time with our children, but we also want to engage in our favorite . . . hobbies. We want to lose weight, but we also want to enjoy the foods we crave. We want to become Christlike, but we also want to give the guy who cuts us off in traffic a piece of our mind.<\/i><\/p>\n

    Satan\u2019s purpose is to tempt us to exchange the priceless pearls of true happiness and eternal values for a fake plastic trinket that is merely an illusion and counterfeit of happiness and joy.<\/i>5<\/sup><\/p>\n

    An example of one of Satan\u2019s counterfeits is pride versus self-worth. Haughty pride is a temporary and poor substitute for a correct sense of one\u2019s own value. How about leisure and ease versus fulfillment?A common illusion in our day and age is that we can find happiness in a life of leisure and ease. The truth is that we are far more content when laboring daily in a cause we believe to be important enough to spend our entire lives on.<\/p>\n

    In Doctrine and Covenants 130:20\u201321 we read:<\/p>\n

    There is a law, irrevocably decreed in heaven before the foundations of this world, upon which all blessings are predicated\u2014<\/i><\/p>\n

    And when we obtain any blessing from God, it is by obedience to that law upon which it is predicated<\/i>.<\/p>\n

    About a hundred years ago Elder James E. Talmage wrote:<\/p>\n

    The present is an age of pleasure-seeking, and men are losing their sanity in the mad rush for sensations that do but excite and disappoint. In this day of counterfeits, adulterations, and base imitations, the devil is busier than he has ever been in the course of human history, in the manufacture of pleasures, both old and new; and these he offers for sale in most attractive fashion, falsely labeled, <\/i>\u201cHappiness.\u201d In this soul-destroying craft he is without a peer; he has had centuries of experience and practice, and by his skill he controls the market. He has learned the tricks of the trade, and knows well how to catch the eye and arouse the desire of his customers. He puts up the stuff in bright-colored packages, tied with tinsel string and tassel; and crowds flock to his bargain counters, hustling and crushing one another in their frenzy to buy.<\/i><\/p>\n

    Follow one of the purchasers as he goes off gloatingly with his gaudy packet, and watch him as he opens it. What finds he inside the gilded wrapping? He had expected fragrant happiness, but uncovers only an inferior brand of pleasure, the stench of which is nauseating<\/i>.6<\/sup><\/p>\n

    Real joy and happiness come from living in such a way that our Heavenly Father will be pleased with us. As we learn in section 52 of the Doctrine and Covenants, humility and obedience help us understand the Lord\u2019s \u201cpattern in all things, that ye may not be deceived; for Satan is abroad in the land, and he goeth forth deceiving the nations.\u201d7<\/sup><\/p>\n

    Install Software Updates<\/b><\/h2>\n

    Another security tip is to keep your software up to date. Some security experts even say that applying software updates is one of the most important things you can do with your computer. If you don\u2019t update your software, you are very likely going to get some kind of malicious software in your system and even get hijacked. Virus writers, hackers, and other ill-intentioned individuals are constantly coming up with new and inventive ways to attack.<\/p>\n

    The majority of software updates are created to patch security vulnerabilities in programs. The odds are usually good that the update is made to protect against an attack that has already been detected. By updating and closing old holes, you are decreasing the number of known problems that attackers can use to get at you. Cybercriminals depend on the apathy of users regarding software updates to keep their malicious endeavors running. The good news is that most software updates aren\u2019t difficult to implement. In fact, many systems even allow for the updates to be managed automatically.<\/p>\n

    In the same way that keeping your software current helps keep you safe on your computer, keeping your temple recommend current helps keep you spiritually safe. President Howard W. Hunter was known for his emphasis on temple worthiness. He said:<\/p>\n

    To qualify for the blessings of the temple, each of us must ensure that our lives are in harmony with the teachings of the Church. .<\/i> .<\/i> .<\/i><\/p>\n

    You must believe in God the Eternal Father, in his Son Jesus Christ, and in the<\/i> <\/i>Holy Ghost.<\/i> <\/i>You must believe that this is their sacred and divine work. .<\/i> .<\/i> .<\/i><\/p>\n

    You must sustain the General Authorities and local authorities of the Church. .<\/i> <\/b>.<\/i> <\/b>.<\/i><\/p>\n

    . . . It is a commitment that you will follow the instructions that come from the presiding officers of the Church. Likewise you should feel loyalty toward the bishop and stake president and other Church leaders.<\/i> .<\/i> .<\/i> .<\/i><\/p>\n

    You must be morally clean to enter into the holy temple.<\/i> <\/b>.<\/i> <\/b>.<\/i> <\/b>.<\/i><\/p>\n

    You must ensure that there is nothing in your relationship with<\/i> <\/i>family<\/i> <\/i>members that is out of harmony with the teachings of the Church.<\/i> <\/b>.<\/i> <\/b>.<\/i> <\/b>.<\/i><\/p>\n

    . . . You must be honest in all of your dealings with others. .<\/i> <\/b>.<\/i> <\/b>. Our basic integrity is at stake when we violate this covenant.<\/i><\/p>\n

    . . . You should strive to do your duty in the Church, attending your sacrament, priesthood, and other meetings. .<\/i> <\/b>.<\/i> <\/b>. Be active participants in your wards and branches, and be one your leaders can depend on.<\/i><\/p>\n

    . . . You must be a full-tithe payer and live the Word of Wisdom. .<\/i> <\/b>.<\/i> <\/b>. Observation over many years has shown that those who faithfully pay their \u00adtithing and observe the Word of Wisdom are usually faithful in all other matters that relate to entering the holy temple.<\/i>8<\/sup><\/p>\n

    We can commit now to keeping ourselves safe from spiritual attacks by living so as to be able to keep a current temple recommend.<\/p>\n

    Back Up Your Files<\/b><\/h2>\n

    There is a devious new type of computer attack called ransomware. The most notorious version of this is called CryptoLocker. Through an email attachment, a program is installed on your computer that encrypts all of your files. Then you are instructed to pay a ransom to get the key to decrypt your files. So while all the data in your files are still on your computer, you will not be able to access any of them until you pay the ransom. Some victims have indicated that even after paying the ransom, they were still unable to recover their data. It is estimated that CryptoLocker extorted three million dollars from its victims in the first six months of operation.<\/p>\n

    Far more common situations of data loss are those due to accidental deletion or hardware failure. Probably most of us have experienced that. A good backup plan can protect us. Ideally you will have your files or your data in at least three places: the place where you work on them, a separate storage device, and off-site. Keep your files on your computer, back them up to an external hard drive, and then back them up in a different location. You can even back up your files to a cloud-based account such as Google Drive or Dropbox for free or for a small fee. It is good to establish a plan for keeping your backup files current.<\/p>\n

    In a way, computer backups can be compared to keeping a journal\u2014a way of backing up our memories. We have been counseled to keep a journal. For example, President Spencer W. Kimball said:<\/p>\n

    Your journal is your autobiography, so it should be kept carefully. You are unique, and there may be incidents in your experience that are more noble and praiseworthy in their way than those recorded in any other life. There may be a flash of illumination here and a story of faithfulness there. . . .<\/i><\/p>\n

    . . . Begin today and write in it your goings and comings, your deepest thoughts, your achievements and your failures, your associations and your triumphs, your impressions and your testimonies. Remember, the Savior chastised those who failed to record important events.<\/i>9<\/sup><\/p>\n

    <\/i>He also said, \u201cThis is what the Lord has commanded, and those who keep a personal journal are more likely to keep the Lord in remembrance in their daily lives.<\/i>\u201d10<\/sup><\/p>\n

    President Monson demonstrated the value of his journal keeping when he said:<\/p>\n

    I would like to share with you just a tiny sampling of the experiences I have had wherein prayers were heard and answered and which, in retrospect, brought blessings into my life as well as the lives of others. My daily journal, kept over all these years, has helped provide some specifics which I most likely would not otherwise be able to recount.<\/i>11<\/sup><\/p>\n

    President Henry B. Eyring placed an emphasis on using journals to document gratitude. He said:<\/p>\n

    Before I would write, I would ponder this question: \u201cHave I seen the hand of God reaching out to touch us or our children or our family today?\u201d As I kept at it, something began to happen. As I would cast my mind over the day, I would see evidence of what God had done for one of us that I had not recognized in the busy moments of the day. As that happened, and it happened often, I realized that trying to remember had allowed God to show me what He had done.<\/i><\/p>\n

    More than gratitude began to grow in my heart. Testimony grew. I became ever more certain that our Heavenly Father hears and answers prayers. I felt more gratitude for the softening and refining that come because of the Atonement of the Savior Jesus Christ. And I grew more confident that the Holy Ghost can bring all things to our remembrance\u2014even things we did not notice or pay attention to when they happened.<\/i> .<\/i> .<\/i> .<\/i><\/p>\n

    My point is to urge you to find ways to recognize and remember God\u2019s kindness. It will build our testimonies.<\/i>12<\/sup><\/p>\n

    My current and former students may be laughing a little right now because for the past several years I have taken time during each class session for the students, and for myself, to document something for which they are grateful. Then we take some class time to share. Research shows that people who take time to do this are happier, healthier, and smarter. And, as noted by our Church leaders, this practice will bring us closer to the Lord and build our testimonies.<\/p>\n

    Passwords<\/b><\/h2>\n

    Passwords are nearly ubiquitous in today\u2019s computing environment. Unfortunately, several of us may have insecure passwords that leave us vulnerable to hackers and identity theft. In fact, the most common passwords are \u201c123456789\u201d (sometimes only to 6 or 4) and the word password.<\/i><\/p>\n

    A tip for better password security is to use unique passwords. This means having a different password for each account rather than reusing a password for multiple accounts. This is important because hackers can get lists of passwords used on websites that have been hacked. Hackers can test those listed passwords against other accounts and websites.<\/p>\n

    A related tip is to use strong passwords. This means having longer passwords that include upper- and lowercase letters, numbers, and special characters. These types of passwords take longer for hackers to crack than words that are found in a dictionary. Some suggest using a phrase or a rhyme as a password. One of my passwords is \u201cain\u2019tnobodygottimeforthat,\u201d which, ironically, takes a long time to type. But even my children can remember that password. We also joke about using the last eight digits of pi.<\/i><\/p>\n

    <\/i>If you are like most people, you will have trouble remembering a whole list of unique and strong passwords without writing them down or storing them in a computer file, which can defeat the purpose of having secure passwords. There is a punch line in a comic strip that says, \u201cThrough 20 years of effort, we\u2019ve successfully trained everyone to use passwords that are hard for humans to remember, but easy for computers to guess.\u201d13<\/sup><\/p>\n

    Consequently, most security experts recommend using a password manager, which is software that securely keeps track of all your user accounts and passwords. I recently counted 211 accounts with passwords stored in my password manager. Some of the best password managers are LastPass, 1Password, or Roboform.<\/p>\n

    I think good password management is like prayer. Sometimes we may find ourselves with casual, short prayers that are essentially the same day after day. But we are spiritually safer when we take the time to have sincere prayer\u2014long, complicated prayers. While simple prayers are a good thing, we periodically need to truly communicate with our Father in Heaven.<\/p>\n

    Elder David A. Bednar said:<\/p>\n

    Simply saying prayers is quite a different thing from engaging in meaningful prayer. I expect that all of us already know that prayer is essential for our spiritual development and protection. But what we know is not always reflected in what we do. And even though we recognize the importance of prayer, all of us can improve the consistency and efficacy of our personal and<\/i> <\/i>family prayers.<\/i>14<\/sup><\/p>\n

    President Spencer W. Kimball remarked:<\/p>\n

    I find that when I get casual in my relationships with divinity and when it seems that no divine ear is listening and no divine voice is speaking, that I am far, far away. If I immerse myself in the scriptures, the distance narrows and spirituality returns. I find myself loving more intensely those whom I must love with all my heart and mind and strength, and loving them more. I find it easier to abide their counsel.<\/i>15<\/sup><\/p>\n

    And what if we feel at times that we can\u2019t do it all? That\u2019s where the Atonement brings us peace. Far better than a password manager, the Atonement makes up for our shortcomings. We receive the blessings of the Atonement when we repent of our sins and keep the commandments.<\/p>\n

    In the words of Elder Richard G. Scott:<\/p>\n

    The Redeemer will safely lead you over the most difficult obstacles of life. His laws are absolutely secure anchors of protection that dispel fear and assure success in an otherwise dangerous world. Such a life will certainly provide you peace and happiness.<\/i><\/p>\n

    True, enduring happiness, with the accompanying strength, courage, and capacity to overcome the greatest difficulties, will come as you center your life in Jesus Christ.<\/i>16<\/sup><\/p>\n

    I am grateful for the all-encompassing power of the Atonement, which compensates for our inadequacies and provides us with peace, comfort, and courage.<\/p>\n

    Conclusion<\/b><\/h2>\n

    In summary, for cybersecurity do the following:<\/p>\n

      \n
    • Be attentive to security messages.<\/li>\n
    • Watch out for phishing emails.<\/li>\n
    • Keep your software up to date.<\/li>\n
    • Back up your files.<\/li>\n
    • Use strong, unique passwords and a \u00adpassword manager.<\/li>\n<\/ul>\n

      And for spiritual safety do the following:<\/p>\n

        \n
      • Be in tune with the Holy Ghost.<\/li>\n
      • Beware of counterfeit happiness.<\/li>\n
      •  Keep a current temple recommend.<\/li>\n
      • Keep a journal.<\/li>\n
      • Engage in meaningful prayer.<\/li>\n<\/ul>\n

        As we make and keep sacred covenants, we are blessed with power to withstand adversity, resist temptation, and enjoy a fulness of gospel blessings. Elder Neal A. Maxwell taught, \u201cIf we will keep our covenants, the covenants will keep us spiritually safe.\u201d17<\/sup><\/p>\n

        President Harold B. Lee said:<\/p>\n

        The only safety we have as members of this church is to . . . learn to give heed to the words and commandments that the Lord shall give through his prophet. . . . There will be some things that take patience and faith. You may not like what comes. . . . It may contradict your political views. It may contradict your social views. It may interfere with some of your social life. But if you listen to these things, as if from the mouth of the Lord himself, . . . \u201cthe gates of hell shall not prevail against you . . . , and the Lord God will disperse the powers of darkness from before you. . . .\u201d (D&C 21:6).<\/i>18<\/sup><\/p>\n

        Let us be sure that the spiritual foundation for each of us is the rock of our Redeemer, as Helaman taught his sons:<\/p>\n

        And now, my sons, remember, remember that it is upon the rock of our Redeemer, who is Christ, the Son of God, that ye must build your foundation; that when the devil shall send forth his mighty winds, yea, his shafts in the whirlwind, yea, when all his hail and his mighty storm shall beat upon you, it shall have no power over you to drag you down to the gulf of misery and endless wo, because of the rock upon which ye are built, which is a sure foundation, a foundation whereon if men build they cannot fall.<\/i>19<\/sup><\/p>\n

        I testify that we have a loving Heavenly Father who has a plan for us to return to Him. Through obedience we can find happiness, safety, and peace. In the name of Jesus Christ, amen.<\/p>\n","protected":false},"template":"","tags":[],"acf":[],"yoast_head":"\nCybersecurity and Spiritual Safety | BYU Speeches<\/title>\n<meta name=\"description\" content=\"To have spiritual safety we must be in tune with the Holy Ghost, be aware of fake happiness, keep a current temple recommend, and pray.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and Spiritual Safety\" \/>\n<meta property=\"og:description\" content=\"To have spiritual safety we must be in tune with the Holy Ghost, be aware of fake happiness, keep a current temple recommend, and pray.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/\" \/>\n<meta property=\"og:site_name\" content=\"BYU Speeches\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/byuspeeches\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-03T15:24:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/speeches.byu.edu\/wp-content\/uploads\/2024\/01\/Speeches_ShareCard2024.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@BYUSpeeches\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"17 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Bonnie Brinton Anderson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/\",\"url\":\"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/\",\"name\":\"Cybersecurity and Spiritual Safety | BYU Speeches\",\"isPartOf\":{\"@id\":\"https:\/\/speeches.byu.edu\/#website\"},\"datePublished\":\"2015-12-08T19:22:03+00:00\",\"dateModified\":\"2022-03-03T15:24:09+00:00\",\"description\":\"To have spiritual safety we must be in tune with the Holy Ghost, be aware of fake happiness, keep a current temple recommend, and pray.\",\"breadcrumb\":{\"@id\":\"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Speeches\",\"item\":\"https:\/\/speeches.byu.edu\/talks\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bonnie Brinton Anderson\",\"item\":\"https:\/\/speeches.byu.edu\/speakers\/bonnie-brinton-anderson\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity and Spiritual Safety\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/speeches.byu.edu\/#website\",\"url\":\"https:\/\/speeches.byu.edu\/\",\"name\":\"BYU Speeches\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/speeches.byu.edu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/speeches.byu.edu\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/speeches.byu.edu\/#organization\",\"name\":\"BYU Speeches\",\"url\":\"https:\/\/speeches.byu.edu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/speeches.byu.edu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speeches.byu.edu\/wp-content\/uploads\/2023\/09\/BYUspeechesLogo.png\",\"contentUrl\":\"https:\/\/speeches.byu.edu\/wp-content\/uploads\/2023\/09\/BYUspeechesLogo.png\",\"width\":1000,\"height\":1000,\"caption\":\"BYU Speeches\"},\"image\":{\"@id\":\"https:\/\/speeches.byu.edu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/byuspeeches\",\"https:\/\/x.com\/BYUSpeeches\",\"https:\/\/www.instagram.com\/byuspeeches\/\",\"https:\/\/www.pinterest.com\/byuspeeches\/\",\"https:\/\/www.youtube.com\/user\/BYUSpeeches\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity and Spiritual Safety | BYU Speeches","description":"To have spiritual safety we must be in tune with the Holy Ghost, be aware of fake happiness, keep a current temple recommend, and pray.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity and Spiritual Safety","og_description":"To have spiritual safety we must be in tune with the Holy Ghost, be aware of fake happiness, keep a current temple recommend, and pray.","og_url":"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/","og_site_name":"BYU Speeches","article_publisher":"https:\/\/www.facebook.com\/byuspeeches","article_modified_time":"2022-03-03T15:24:09+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/speeches.byu.edu\/wp-content\/uploads\/2024\/01\/Speeches_ShareCard2024.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@BYUSpeeches","twitter_misc":{"Est. reading time":"17 minutes","Written by":"Bonnie Brinton Anderson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/","url":"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/","name":"Cybersecurity and Spiritual Safety | BYU Speeches","isPartOf":{"@id":"https:\/\/speeches.byu.edu\/#website"},"datePublished":"2015-12-08T19:22:03+00:00","dateModified":"2022-03-03T15:24:09+00:00","description":"To have spiritual safety we must be in tune with the Holy Ghost, be aware of fake happiness, keep a current temple recommend, and pray.","breadcrumb":{"@id":"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/speeches.byu.edu\/talks\/bonnie-brinton-anderson\/cybersecurity-and-spiritual-safety\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Speeches","item":"https:\/\/speeches.byu.edu\/talks\/"},{"@type":"ListItem","position":2,"name":"Bonnie Brinton Anderson","item":"https:\/\/speeches.byu.edu\/speakers\/bonnie-brinton-anderson\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity and Spiritual Safety"}]},{"@type":"WebSite","@id":"https:\/\/speeches.byu.edu\/#website","url":"https:\/\/speeches.byu.edu\/","name":"BYU Speeches","description":"","publisher":{"@id":"https:\/\/speeches.byu.edu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/speeches.byu.edu\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/speeches.byu.edu\/#organization","name":"BYU Speeches","url":"https:\/\/speeches.byu.edu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/speeches.byu.edu\/#\/schema\/logo\/image\/","url":"https:\/\/speeches.byu.edu\/wp-content\/uploads\/2023\/09\/BYUspeechesLogo.png","contentUrl":"https:\/\/speeches.byu.edu\/wp-content\/uploads\/2023\/09\/BYUspeechesLogo.png","width":1000,"height":1000,"caption":"BYU Speeches"},"image":{"@id":"https:\/\/speeches.byu.edu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/byuspeeches","https:\/\/x.com\/BYUSpeeches","https:\/\/www.instagram.com\/byuspeeches\/","https:\/\/www.pinterest.com\/byuspeeches\/","https:\/\/www.youtube.com\/user\/BYUSpeeches"]}]}},"_links":{"self":[{"href":"https:\/\/speeches.byu.edu\/wp-json\/wp\/v2\/speech\/9834"}],"collection":[{"href":"https:\/\/speeches.byu.edu\/wp-json\/wp\/v2\/speech"}],"about":[{"href":"https:\/\/speeches.byu.edu\/wp-json\/wp\/v2\/types\/speech"}],"wp:attachment":[{"href":"https:\/\/speeches.byu.edu\/wp-json\/wp\/v2\/media?parent=9834"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/speeches.byu.edu\/wp-json\/wp\/v2\/tags?post=9834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}