Blog
Verizon 2024 Data Breach Investigation Report
Verizon's annual Data Breach Investigation Report (DBIR) is out! Now in its seventeenth year, the Verizon DBIR is trusted and respected in cybersecurity...
Secure by Design
Cybersecurity is hard. Unsecure technology can lead to vulnerabilities that can threaten a network, data and users. Controls are put in place using...
World Password Day - May 2, 2024
In 2005, security researcher Mark Burnett, encouraged the creation of a 'password day' in hopes that users would update their passwords on an...
Introducing Explora-Academic
Explora- Academic will allow a single search interface for academic level (college) resources currently available to MOREnet members.
Explora-Academic will...
Great New AI Tools from MOREnet Partner Skill Struck
Skill Struck presents a comprehensive K-12 computer science platform, designed to safely integrate technology into the classroom. This platform serves as a...
2FA, MFA, Tokens and Codes
Having multiple forms of authentication can help to keep your accounts safe. This extra layer of security, in addition to having a strong...
Navigating Code.org and Its Resources
Code.org has been leading the charge for computer science education in schools for several years. Code.org has partnered with industry leaders...
The Importance of Student Data Privacy - Who's Viewing Your Data?
Do you know all the applications your district is using and who has access to this data? When do districts need a data privacy agreement and why is this important?
Hook, Line and Sinker. Opening the Phishing Box.
Phishing-Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware....
Choose How You Cruise
Web browsers are fundamental tools for navigating the Internet for information and resources. It's important to understand the security components of the browser...
Tech Support Scams
You are browsing websites, checking out the headlines, shopping or catching up on social media. Suddenly you are presented with a screen that...
Honor Among Thieves
Is there such a thing? This phrase suggests that crooks trust each other. They will not steal from each other. When it comes...
Time to Spring Clean - Digitally
Block some time to review what you have saved on your computer and in the cloud; cleaning it will improve efficiency as well as potentially protect your data.
How To Configure a Raspberry Pi as an Ad-Blocker
In this in-depth Pi Day project spotlight, I’ll walk you through the steps to turn a Raspberry Pi into an ad-blocking DNS server...
Artificial Intelligence and the Criminal Mind
The hype of artificial intelligence (AI) has caused excitement and fear. Various AI tools can be used to create audio, video, written content,...
I Always Feel Like Somebody's Watching Me
That catchy tune by Rockwell is applicable in today's society. Social media and other online presences allow for Open Source Intelligence (OSINT)...
AI Bloopers
Can Artificial Intelligence results be wrong? Unfortunately machine learning and algorithms are lacking some human interventions to provide accurate and factual data. There...
Conversations with AI. Great Google tool for learning to be descriptive
One of the best ways to get better results from Artificial Intelligence tools is to be very descriptive with your conversations (prompts). ...
Why? Because I Said So!
Security is hard, right? So many restrictions! Passwords, MFA, content filtering, app restrictions, screen lock outs, etc. Why do I need to have...
Will You Be Mine?
Valentine's Day is a time for romance. Many will celebrate with exquisite dinners and gifts. Others prefer a simpler way to express their...