Two-factor/multi-factor authentication graphic

Can We Kill the Password?

There have been decades of discussions about a passwordless society, but the fact is, we use passwords everywhere. Usernames and passwords have been in existence since...

Virus cybersecurity banner

Focus on Malware

Not all malware is ransomware, but all ransomware is malware. Malware is software that is maliciously designed to disrupt or gain unauthorized access to a...

MOREnet logo with school building graphic

Cybersecurity Best Practices

Cybersecurity threats are becoming more frequent, resourceful and dangerous. It is important for organizations to develop a strong fortress to protect assets, data and people....

Tools and resources small banner

Cybersecurity Tools and Resources

Defending against cyberattacks and researching resources to fortify your organization's infrastructure are at the top of the list for IT personnel. Approach this strategy with...

MOREnet Video Blog banner/logo

MOREnet Video Blog: Rosen Databases

Patti Jones and Bob Martin explore the online resources available to teens from the Rosen databases.

Secure system banner

Cyber Risk Analysis

A part of developing a cyber-secure environment involves evaluation of the possible risks facing the organization. This is a crucial component of your organization's incident...

Tools and resources small banner

How Important is AI to Cyber Defense?

Could artificial intelligence (AI) be the answer to fulfilling our cybersecurity job gaps? AI has become essential to cybersecurity. It has the ability to analyze...

Email graphic

Your Email Address is Personal

Your email address is one of the ways you connect with people electronically, and it can reveal a lot about you. Maybe it's as simple...

Cybersecurity small banner

Smartphones and Hacks

Got a flip phone? Move on. This blog will be of no use to you. But if you are enjoying the benefits of holding the...

MOREnet Video Blog banner/logo

MOREnet Video Blog: Making a Makerspace

Bob Martin and Joey Bryant tour the MILL.

Data Privacy Day 2022

Data Privacy Day - January 28

In 2009, the US House of Representatives formally recognized Jan. 28 as National Data Privacy Day #DPD. Then, Congress took it further by declaring this...

Network history banner

We've Got Your Six!

Assessments, Threats, Complaints and MORE: MOREnet Cybersecurity Numbers!

Classroom banner - man at whiteboard with chairs

Readjusting Your Cybersecurity Attitude

New Year. New Attitude. Now is the time to take a new look at your cybersecurity practices. Evaluate every aspect of your digital life. Check...

Cyber crime graphic

2021: Cybersecurity Year in Review

As we close the door on 2021 there's no shortage of noteworthy cybersecurity stories. Surly we will have learned from some of these incidents and...

Cybersecurity banner

Cybersecurity Prediction for 2022

Lather. Rinse. Repeat. This seems to be the theme for cyber incidents we will see in 2022. More of the same we experienced in 2021...

Internet Connection small banner

Understanding Copyright Law

The Digital Millennium Copyright Act (DMCA), enacted by the US government in 1998, regulates digital media by protecting it from copyright infringement by users on...

Ransomware graphic

Dancing With the Devil: Ransomware Negotiations

Your important files are encrypted. Many of your documents, photos, databases and other files are no longer accessible because they have been encrypted. A document appears...

Denial of service

DoS, DDoS, TDoS

Denial of Service (DoS). This term is transparent. You want service, it's denied. In technology, a denial of service is a form of cyber attack....

Patching

What is a Zero-day Vulnerability?

Zero-day vulnerabilities are flaws in software security that the vendor has not yet created a patch to fix. Many zero-days are discovered by bug bounty...

Holiday scams graphic

'Tis the Season

The holiday season is upon us. The circumstances we are living in, COVID restrictions plus the high demand/low availability of products, will direct many to...