Blog
Cash, Credit, Debit or NFC?
We are spending money almost daily. There are so many methods of payment for our purchases. You may be using a variety of...
Secure Cart: Navigating the Online Shopping Maze Securely
Don't let the Cyber Grinch steal your holidays. Stay vigilant and follow these safe online shopping tips:
- Use...
'Tis the Season
The holiday season is a time of generosity and giving. The Cyber Grinch knows this too and is ready to take advantage of...
A Picture is Worth a Thousand...er...Dollars?
We've heard that a picture is worth a thousand words right? This means that a photo can reveal so much and raise various...
Is MFA Enough?
What is MFA?
Multi-factor authentication provides an extra layer of security when logging into an asset or service. Logins...
Email and Device Use – Blurred Lines
In today’s world, we are all melding our personal and work life responsibilities. Unfortunately, the lines can be blurred in our goal to...
Week 4 Cybersecurity Awareness Month 2023
Update Software.
Keeping your software up-to-date is important. Besides the benefits of added features, these updates may include security patches...
Week 3 Cybersecurity Awareness Month 2023
Recognize and report phishing.
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or...
Week 2 Cybersecurity Awareness Month 2023
Turn on Multifactor Authentication.
MFA can add a layer of security to your login authentication process. MFA authentication requires the...
Week 1 - Cybersecurity Awareness Month 2023
Use strong passwords and a password manager.
This week focuses on passwords. Instead of using common words that are easy to guess it is...
Cybersecurity Awareness Month October 2023
October of 2004 launched the initiative to assist people with efforts to stay safer and more secure online. Since then, the campaign has...
Update Your Browser
Security updates are often a very important part of a browser update. An out-of-date web browser can open you to serious security flaws...
TOS - Yeah Fine, I Agree
Wait! What? We all see these Terms of Service that must be agreed to in order to access a service, website or asset....
August Funding Opportunities for K-12
MOREnet is pleased to share the availability of two funding opportunities for K-12 schools, aimed improving the cybersecurity resilience of K-12 education communities.
Deepfakes can be used to persuade, spread disinformation or just be fun. Bad actors are finding ways to use artificial intelligence (AI)...
What is a Vulnerability?
A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an...
It's NOT Security Awareness Training
Fingernails on a chalk board. That is what this term sounds like to me. I believe awareness is a result of education. Training...
Secure Password Strategies
The foundation to secure passwords strategies is having a strong password. What makes a strong password? Longer=stronger. Even with two-factor/multi-factor (2FA/MFA) implementations, getting...
Access is a Privilege, Not a Right
The misuse of privileged access is a dangerous security threat. It can lead to extensive damages within an organization. Everyone on your network...
Cybercrime-Trends and Targets
Every day is marred with cyber attacks. Whether it is a data breach, DDoS attack, credential theft or ransomware, these crooks are after...