{"id":7907,"date":"2020-11-04T11:36:35","date_gmt":"2020-11-04T16:36:35","guid":{"rendered":"https:\/\/www.goodwin.edu\/enews\/?p=7907"},"modified":"2024-12-17T17:20:31","modified_gmt":"2024-12-17T22:20:31","slug":"faculty-article-home-network-vulnerability-upnp","status":"publish","type":"post","link":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/","title":{"rendered":"Home Network Vulnerability \u2013 UPnP"},"content":{"rendered":"<p><strong>Home Network Vulnerability \u2014 UPnP<br \/>\n<\/strong><strong>by Mike Saxton, PhD<\/strong><\/p>\n<p>The COVID pandemic of 2020 has prompted numerous organizations to migrate employees to remote status, and we increasingly find that many of these migrations have gone from temporary to fully or partially permanent. Unfortunately, because the changes had to be implemented so quickly, certain consequences have been overlooked.<\/p>\n<p>One of these is the security of home-based networks. Being aware of what our flashing devices are actually doing is more important than ever. Let\u2019s begin by taking a look at the concept of Universal Plug and Play (UPnP).<\/p>\n<p>UPnP makes it easy to connect devices to your home network and access them remotely (Margret, 2020). For example, IP cameras have become increasingly popular for home security. Many come with mobile apps that allow you to monitor the camera when you\u2019re not home and not connected to your home network. UPnP allows the camera automatically to create an opening, or port, in your network so that the app and the device can communicate. On the back end, it\u2019s setting up port forwarding and routing tables.<\/p>\n<p>As an analogy, let\u2019s take someone who is extremely busy and cannot handle the day-to-day cleaning and maintenance of their house. That person hires a series of contractors to do the work and gives the local locksmith permission to provide a key to any of these contractors. Here\u2019s the catch: the contractors are not required to produce any work orders or documentation stating that they\u2019ve actually been hired to perform the work. They just show up, say they need access, and the locksmith gives them a key. Despite the convenience to the homeowner of not constantly having to provide the locksmith with official authorization, this setup is a bad idea. Anyone who finds out about the arrangement can obtain a key to the house without being questioned.<\/p>\n<p>Unfortunately, this example is effectively what UPnP does to a network. Those ports can be created by any device that requests them. The router will automatically set them up, no password or approval required. This means that an attacker can spoof a device to get access to your network, regardless of whether you are using wired or Wi-Fi. Additionally, many home routers have UPnP activated by default, which means it\u2019s on when you first plug the router in, and you must manually shut it off.<\/p>\n<p>Prior to 2020, attacks to your home network might have been somewhat less of a concern, however an increasing number of employees are now working remotely. This means that the <em>attack surface<\/em> \u2014 ways that a hacker can try to get into an organization\u2019s network \u2014 has increased exponentially. A company that has gone from 300 on-site employees to 300 remote employees now has 300 additional locations that require some level of security. As a result, we\u2019ve seen a massive uptick in vulnerability exploits with home networks (Muncaster, 2020).<\/p>\n<p>While employers have various tools at their disposal to limit their exposure to home network infiltrations, those tools might not necessarily help the individual user. The good news is that anything UPnP can set up automatically can also be set up manually. If UPnP is deactivated, you can still set your router to allow the connection to see your IP camera, or allow those video game consoles to stream. Most items such as these have documentation that will tell you exactly what ports you need to open. There might be a bit of a learning curve, but we live in a time where the Internet of Things has produced numerous devices that connect to the Internet, each providing a third party with an opportunity for malicious access to your network.<\/p>\n<p>It\u2019s safe to say that we don\u2019t want our home networks to turn into a hacker\u2019s playground, but how do we address this? The first step is to dig out the log-in information to your router. Older routers have a default username and password (if you have never logged in, it will remain unchanged). If this is the case, the instruction manual will provide your log-in information, which you should immediately change. If you don\u2019t have the manual, a search for your router brand and the model number, usually on a label on the bottom of the unit, will bring it up. Again, once you\u2019ve logged in, you should change the default admin log-in because it\u2019s available to anyone on the Internet!<\/p>\n<p>Newer routers have a randomized log-in password that is printed on a label attached to the unit. Manufacturers started doing this because most people never change the access code from the default, and the older way of doing it led to many compromised routers. The new way provides a different code for each individual unit that is not published online.<\/p>\n<p>After you\u2019ve determined the access password, the next step is to use your web browser to access the router\u2019s control panel. For that, you will need something called your default gateway. It\u2019s an IP address that may look something like this: 192.168.0.1. Basically, it\u2019s the network address of your router. If you don\u2019t know how to find it, there\u2019s an awesome tutorial at <a href=\"https:\/\/www.lifewire.com\/how-to-find-your-default-gateway-ip-address-2626072\">https:\/\/www.lifewire.com\/how-to-find-your-default-gateway-ip-address-2626072<\/a>.<\/p>\n<p>Once you have the network address, type the default gateway into the web browser\u2019s address bar and hit enter. You\u2019ll be at the login screen for your router. From here, the interfaces can be very different depending on manufacturer and model, but the UPnP option is typically under something similar to \u201cnetwork settings\u201d or \u201cadvanced network settings.\u201d For specifics, you can go to the company\u2019s website. The model number and brand name of the router should get you to where you need to go.<\/p>\n<p>A word of caution: be careful what you change. Many of the settings allow for advanced configurations that you might not need. If you\u2019re not sure what something is, don\u2019t change it, as the names of these settings are not always intuitively clear. If you\u2019re interested in exploring some of the basic configurations of a router, port forwarding is a good one, especially if you\u2019re replacing the settings that were automatically put in place by UPnP. In this case, before shutting UPnP off, take note of any settings. You\u2019ll usually see a table or chart with columns such as external port, internal port, IP address, etc. Once you\u2019ve shut it off, you can use the port forwarding option to enter those settings manually, without leaving the door to your home network wide open.<\/p>\n<p>As a final note, never be afraid to ask for help from someone who has knowledge of computer networks and settings. Another option, especially if you want to be a hands-on learner, is to look up tutorials specific to your router on YouTube. They can be helpful, and I\u2019ll let you in on a little secret: even IT pros look things up at times.<\/p>\n<p>References<\/p>\n<p>Margret, C. (2020, May 14). What is UPnP and Why You Need to Turn it Off. FastestVPN Blog. <a href=\"https:\/\/fastestvpn.com\/blog\/what-is-upnp\/\">https:\/\/fastestvpn.com\/blog\/what-is-upnp\/<\/a><\/p>\n<p>Muncaster, P. (2020, August 11). DDoS Attacks Triple in Q2 to Target COVID-19 Home Workers. Infosecurity Magazine. <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/ddos-triple-q2\/\">https:\/\/www.infosecurity-magazine.com\/news\/ddos-triple-q2\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Home Network Vulnerability \u2014 UPnP by Mike Saxton, PhD The COVID pandemic of 2020 has prompted numerous organizations to migrate employees to remote status, and we increasingly find that many of these migrations have gone from temporary to fully or &hellip; <a href=\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Home Network Vulnerability \u2013 UPnP<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":7908,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_stopmodifiedupdate":false,"_modified_date":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1065],"tags":[1123,268,424,1153],"class_list":{"0":"post-7907","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-business-and-leadership","8":"tag-faculty-article","9":"tag-featured","10":"tag-management-and-leadership","11":"tag-network-security","13":"fallback-thumbnail"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Risks of Universal Plug and Play (UPnP) | Goodwin University<\/title>\n<meta name=\"description\" content=\"With the rise of remote work, home networks are at risk. Learn how to fix Universal Plug and Play router settings that make you more vulnerable to hackers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Risks of Universal Plug and Play (UPnP) | Goodwin University\" \/>\n<meta property=\"og:description\" content=\"With the rise of remote work, home networks are at risk. Learn how to fix Universal Plug and Play router settings that make you more vulnerable to hackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/\" \/>\n<meta property=\"og:site_name\" content=\"Goodwin University\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GoodwinUniversity\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-04T16:36:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-17T22:20:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/11\/UPnP_Saxton_11.3.20.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"904\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Saxton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@goodwinuniv\" \/>\n<meta name=\"twitter:site\" content=\"@goodwinuniv\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Saxton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/\"},\"author\":{\"name\":\"Michael Saxton\",\"@id\":\"https:\/\/www.goodwin.edu\/enews\/#\/schema\/person\/1b0efe165003bc53ecc6bc2c82310bc1\"},\"headline\":\"Home Network Vulnerability \u2013 UPnP\",\"datePublished\":\"2020-11-04T16:36:35+00:00\",\"dateModified\":\"2024-12-17T22:20:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/\"},\"wordCount\":1211,\"publisher\":{\"@id\":\"https:\/\/www.goodwin.edu\/enews\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/11\/UPnP_Saxton_11.3.20.jpg\",\"keywords\":[\"Faculty Article\",\"Featured\",\"Management and Leadership\",\"Network Security\"],\"articleSection\":[\"Business and Leadership\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/\",\"url\":\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/\",\"name\":\"The Risks of Universal Plug and Play (UPnP) | Goodwin University\",\"isPartOf\":{\"@id\":\"https:\/\/www.goodwin.edu\/enews\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/11\/UPnP_Saxton_11.3.20.jpg\",\"datePublished\":\"2020-11-04T16:36:35+00:00\",\"dateModified\":\"2024-12-17T22:20:31+00:00\",\"description\":\"With the rise of remote work, home networks are at risk. Learn how to fix Universal Plug and Play router settings that make you more vulnerable to hackers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#primaryimage\",\"url\":\"https:\/\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/11\/UPnP_Saxton_11.3.20.jpg\",\"contentUrl\":\"https:\/\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/11\/UPnP_Saxton_11.3.20.jpg\",\"width\":1920,\"height\":904,\"caption\":\"how to secure your home network\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.goodwin.edu\/enews\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home Network Vulnerability \u2013 UPnP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.goodwin.edu\/enews\/#website\",\"url\":\"https:\/\/www.goodwin.edu\/enews\/\",\"name\":\"Goodwin University\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.goodwin.edu\/enews\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.goodwin.edu\/enews\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.goodwin.edu\/enews\/#organization\",\"name\":\"Goodwin University\",\"url\":\"https:\/\/www.goodwin.edu\/enews\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.goodwin.edu\/enews\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/02\/gu-h-logo.png?fit=250%2C74&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/02\/gu-h-logo.png?fit=250%2C74&ssl=1\",\"width\":250,\"height\":74,\"caption\":\"Goodwin University\"},\"image\":{\"@id\":\"https:\/\/www.goodwin.edu\/enews\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/GoodwinUniversity\/\",\"https:\/\/x.com\/goodwinuniv\",\"https:\/\/www.instagram.com\/goodwinuniversity\/\",\"https:\/\/www.linkedin.com\/school\/goodwinuniversity\/\",\"https:\/\/www.youtube.com\/goodwincollegect\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.goodwin.edu\/enews\/#\/schema\/person\/1b0efe165003bc53ecc6bc2c82310bc1\",\"name\":\"Michael Saxton\",\"description\":\"Dr. Mike Saxton has been an adjunct faculty member at Goodwin for three years. He is passionate about working with adult learners and strives to develop a learning environment that fosters holistic growth for the student, not just academically. He uses his diverse professional, personal, and academic experience to offer guidance above and beyond just passing the test. Dr. Saxton encourages students to pass the test of life through both successes and learning from failures. As an instructor and mentor, he utilizes his diverse background that includes higher education, wireless technology services, information technology, and self-defense instruction. He has served in Student Affairs as an administrator, instructional faculty member, property management, business owner, database developer, network manager, and self-defense instructor. Dr. Saxton graduated Eastern Connecticut State University in 2001 and 2004 with a bachelor\u2019s degree in Computer Science and a master\u2019s degree in Organizational Management, respectively. He holds CompTIA A+, CompTIA Network+, CompTIA Project+, CompTIA Cloud Essentials+, CompTIA CIOS, Six Sigma Data Analytics, and Blockchain Council Blockchain Expert certifications.\",\"url\":\"https:\/\/www.goodwin.edu\/enews\/author\/msaxton\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Risks of Universal Plug and Play (UPnP) | Goodwin University","description":"With the rise of remote work, home networks are at risk. Learn how to fix Universal Plug and Play router settings that make you more vulnerable to hackers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/","og_locale":"en_US","og_type":"article","og_title":"The Risks of Universal Plug and Play (UPnP) | Goodwin University","og_description":"With the rise of remote work, home networks are at risk. Learn how to fix Universal Plug and Play router settings that make you more vulnerable to hackers.","og_url":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/","og_site_name":"Goodwin University","article_publisher":"https:\/\/www.facebook.com\/GoodwinUniversity\/","article_published_time":"2020-11-04T16:36:35+00:00","article_modified_time":"2024-12-17T22:20:31+00:00","og_image":[{"width":1920,"height":904,"url":"https:\/\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/11\/UPnP_Saxton_11.3.20.jpg","type":"image\/jpeg"}],"author":"Michael Saxton","twitter_card":"summary_large_image","twitter_creator":"@goodwinuniv","twitter_site":"@goodwinuniv","twitter_misc":{"Written by":"Michael Saxton","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#article","isPartOf":{"@id":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/"},"author":{"name":"Michael Saxton","@id":"https:\/\/www.goodwin.edu\/enews\/#\/schema\/person\/1b0efe165003bc53ecc6bc2c82310bc1"},"headline":"Home Network Vulnerability \u2013 UPnP","datePublished":"2020-11-04T16:36:35+00:00","dateModified":"2024-12-17T22:20:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/"},"wordCount":1211,"publisher":{"@id":"https:\/\/www.goodwin.edu\/enews\/#organization"},"image":{"@id":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/11\/UPnP_Saxton_11.3.20.jpg","keywords":["Faculty Article","Featured","Management and Leadership","Network Security"],"articleSection":["Business and Leadership"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/","url":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/","name":"The Risks of Universal Plug and Play (UPnP) | Goodwin University","isPartOf":{"@id":"https:\/\/www.goodwin.edu\/enews\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#primaryimage"},"image":{"@id":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/11\/UPnP_Saxton_11.3.20.jpg","datePublished":"2020-11-04T16:36:35+00:00","dateModified":"2024-12-17T22:20:31+00:00","description":"With the rise of remote work, home networks are at risk. Learn how to fix Universal Plug and Play router settings that make you more vulnerable to hackers.","breadcrumb":{"@id":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#primaryimage","url":"https:\/\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/11\/UPnP_Saxton_11.3.20.jpg","contentUrl":"https:\/\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/11\/UPnP_Saxton_11.3.20.jpg","width":1920,"height":904,"caption":"how to secure your home network"},{"@type":"BreadcrumbList","@id":"https:\/\/www.goodwin.edu\/enews\/faculty-article-home-network-vulnerability-upnp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.goodwin.edu\/enews\/"},{"@type":"ListItem","position":2,"name":"Home Network Vulnerability \u2013 UPnP"}]},{"@type":"WebSite","@id":"https:\/\/www.goodwin.edu\/enews\/#website","url":"https:\/\/www.goodwin.edu\/enews\/","name":"Goodwin University","description":"","publisher":{"@id":"https:\/\/www.goodwin.edu\/enews\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.goodwin.edu\/enews\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.goodwin.edu\/enews\/#organization","name":"Goodwin University","url":"https:\/\/www.goodwin.edu\/enews\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.goodwin.edu\/enews\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/02\/gu-h-logo.png?fit=250%2C74&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/02\/gu-h-logo.png?fit=250%2C74&ssl=1","width":250,"height":74,"caption":"Goodwin University"},"image":{"@id":"https:\/\/www.goodwin.edu\/enews\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/GoodwinUniversity\/","https:\/\/x.com\/goodwinuniv","https:\/\/www.instagram.com\/goodwinuniversity\/","https:\/\/www.linkedin.com\/school\/goodwinuniversity\/","https:\/\/www.youtube.com\/goodwincollegect"]},{"@type":"Person","@id":"https:\/\/www.goodwin.edu\/enews\/#\/schema\/person\/1b0efe165003bc53ecc6bc2c82310bc1","name":"Michael Saxton","description":"Dr. Mike Saxton has been an adjunct faculty member at Goodwin for three years. He is passionate about working with adult learners and strives to develop a learning environment that fosters holistic growth for the student, not just academically. He uses his diverse professional, personal, and academic experience to offer guidance above and beyond just passing the test. Dr. Saxton encourages students to pass the test of life through both successes and learning from failures. As an instructor and mentor, he utilizes his diverse background that includes higher education, wireless technology services, information technology, and self-defense instruction. He has served in Student Affairs as an administrator, instructional faculty member, property management, business owner, database developer, network manager, and self-defense instructor. Dr. Saxton graduated Eastern Connecticut State University in 2001 and 2004 with a bachelor\u2019s degree in Computer Science and a master\u2019s degree in Organizational Management, respectively. He holds CompTIA A+, CompTIA Network+, CompTIA Project+, CompTIA Cloud Essentials+, CompTIA CIOS, Six Sigma Data Analytics, and Blockchain Council Blockchain Expert certifications.","url":"https:\/\/www.goodwin.edu\/enews\/author\/msaxton\/"}]}},"jetpack_featured_media_url":"https:\/\/www.goodwin.edu\/enews\/wp-content\/uploads\/2020\/11\/UPnP_Saxton_11.3.20.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6i2nK-23x","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/www.goodwin.edu\/enews\/wp-json\/wp\/v2\/posts\/7907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.goodwin.edu\/enews\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.goodwin.edu\/enews\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.goodwin.edu\/enews\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.goodwin.edu\/enews\/wp-json\/wp\/v2\/comments?post=7907"}],"version-history":[{"count":3,"href":"https:\/\/www.goodwin.edu\/enews\/wp-json\/wp\/v2\/posts\/7907\/revisions"}],"predecessor-version":[{"id":8045,"href":"https:\/\/www.goodwin.edu\/enews\/wp-json\/wp\/v2\/posts\/7907\/revisions\/8045"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.goodwin.edu\/enews\/wp-json\/wp\/v2\/media\/7908"}],"wp:attachment":[{"href":"https:\/\/www.goodwin.edu\/enews\/wp-json\/wp\/v2\/media?parent=7907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.goodwin.edu\/enews\/wp-json\/wp\/v2\/categories?post=7907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.goodwin.edu\/enews\/wp-json\/wp\/v2\/tags?post=7907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}