Blog
Hook, Line and Sinker. Opening the Phishing Box.
Phishing-Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware....
Tech Support Scams
You are browsing websites, checking out the headlines, shopping or catching up on social media. Suddenly you are presented with a screen that...
Honor Among Thieves
Is there such a thing? This phrase suggests that crooks trust each other. They will not steal from each other. When it comes...
How To Configure a Raspberry Pi as an Ad-Blocker
In this in-depth Pi Day project spotlight, I’ll walk you through the steps to turn a Raspberry Pi into an ad-blocking DNS server...
Artificial Intelligence and the Criminal Mind
The hype of artificial intelligence (AI) has caused excitement and fear. Various AI tools can be used to create audio, video, written content,...
I Always Feel Like Somebody's Watching Me
That catchy tune by Rockwell is applicable in today's society. Social media and other online presences allow for Open Source Intelligence (OSINT)...
Why? Because I Said So!
Security is hard, right? So many restrictions! Passwords, MFA, content filtering, app restrictions, screen lock outs, etc. Why do I need to have...
Cyber Sentry: Tracing the Evolution of Cyber Defenses
The term 'cybersecurity' has become a part of our everyday vernacular. Cybersecurity refers to frameworks, tools and practices to keep technology systems and...
How to Meet and Maintain Your Cyber Risk Insurance Requirements
Cyber attacks can be detrimental to an organization if not proactively addressed. Attacks can be disruptive and costly. There is a chance of...
Cybersecurity Frameworks-One Size Fits All?
A cybersecurity framework can assist with cybersecurity risk management by establishing a set of guidelines, standards and best practices. The purpose of describing...
New Year, New Shield
As we close out this year and enter into 2024 we tend to make resolutions. This is an opportunity to set intentions for...
Cash, Credit, Debit or NFC?
We are spending money almost daily. There are so many methods of payment for our purchases. You may be using a variety of...
Revolutionizing MOREnet Member Libraries: REAL Funding Success Story
Every day, libraries serve their communities by providing an Internet connection that grants patrons access to a wealth of information that can be...
Netsweeper onGuard and LanSchool
In addition to Netsweeper as a content filtering solution, we are also happy to have consortium pricing directly through Netsweeper for additional...
A Picture is Worth a Thousand...er...Dollars?
We've heard that a picture is worth a thousand words right? This means that a photo can reveal so much and raise various...
Is MFA Enough?
What is MFA?
Multi-factor authentication provides an extra layer of security when logging into an asset or service. Logins...
Week 3 Cybersecurity Awareness Month 2023
Recognize and report phishing.
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or...
Week 2 Cybersecurity Awareness Month 2023
Turn on Multifactor Authentication.
MFA can add a layer of security to your login authentication process. MFA authentication requires the...
Cybersecurity Awareness Month October 2023
October of 2004 launched the initiative to assist people with efforts to stay safer and more secure online. Since then, the campaign has...
Humans in the Loop
Artificial Intelligence (AI) is gaining ground to assist us in our everyday lives and workplaces. Most are familiar with voice assistants. These devices...