Cybersecurity blog banner - holiday scams

Cash, Credit, Debit or NFC?

We are spending money almost daily. There are so many methods of payment for our purchases. You may be using a variety of...

Cybersecurity blog banner - holiday scams

Secure Cart: Navigating the Online Shopping Maze Securely

Don't let the Cyber Grinch steal your holidays. Stay vigilant and follow these safe online shopping tips:

  • Use...

Cybersecurity blog banner - beware phishing scams

'Tis the Season

The holiday season is a time of generosity and giving. The Cyber Grinch knows this too and is ready to take advantage of...

Permission Click small banner

A Picture is Worth a Thousand...er...Dollars?

We've heard that a picture is worth a thousand words right? This means that a photo can reveal so much and raise various...

Cybersecurity blog - two-factor authentication

Is MFA Enough?

What is MFA?

Multi-factor authentication provides an extra layer of security when logging into an asset or service. Logins...

Cybersecurity blog - work/personal lines

Email and Device Use – Blurred Lines

In today’s world, we are all melding our personal and work life responsibilities.  Unfortunately, the lines can be blurred in our goal to...

Cybersecurity Awareness Month - keep software up to date

Week 4 Cybersecurity Awareness Month 2023

Update Software.

Keeping your software up-to-date is important. Besides the benefits of added features, these updates may include security patches...

Cybersecurity Awareness Month - be suspicious of emails

Week 3 Cybersecurity Awareness Month 2023

Recognize and report phishing.

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or...

Cybersecurity blog - two-factor authentication

Week 2 Cybersecurity Awareness Month 2023

Turn on Multifactor Authentication.

MFA can add a layer of security to your login authentication process. MFA authentication requires the...

Cybersecurity Awareness Month - use strong passwords

Week 1 - Cybersecurity Awareness Month 2023

Use strong passwords and a password manager.
This week focuses on passwords. Instead of using common words that are easy to guess it is...

Cybersecurity Awareness Month - cybersecurity starts with you

Cybersecurity Awareness Month October 2023

October of 2004 launched the initiative to assist people with efforts to stay safer and more secure online. Since then, the campaign has...

Work from home graphic

Update Your Browser

Security updates are often a very important part of a browser update. An out-of-date web browser can open you to serious security flaws...

lady on a laptop graphic

TOS - Yeah Fine, I Agree

Wait! What? We all see these Terms of Service that must be agreed to in order to access a service, website or asset....

CYBER.org logo

August Funding Opportunities for K-12

MOREnet is pleased to share the availability of two funding opportunities for K-12 schools, aimed improving the cybersecurity resilience of K-12 education communities.

Deepfakes can be used to persuade, spread disinformation or just be fun. Bad actors are finding ways to use artificial intelligence (AI)...

Threat Management

What is a Vulnerability?

A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an...

Man presenting at whiteboard graphic

It's NOT Security Awareness Training

Fingernails on a chalk board. That is what this term sounds like to me. I believe awareness is a result of education. Training...

Secure password strategies graphic

Secure Password Strategies

The foundation to secure passwords strategies is having a strong password. What makes a strong password? Longer=stronger. Even with two-factor/multi-factor (2FA/MFA) implementations, getting...

Consortium Discount Pagefreezer

Access is a Privilege, Not a Right

The misuse of privileged access is a dangerous security threat. It can lead to extensive damages within an organization. Everyone on your network...

Cyber crook graphic

Cybercrime-Trends and Targets

Every day is marred with cyber attacks. Whether it is a data breach, DDoS attack, credential theft or ransomware, these crooks are after...