Cybersecurity Awareness Month - cybersecurity starts with you

Cybersecurity Awareness Month October 2023

October of 2004 launched the initiative to assist people with efforts to stay safer and more secure online. Since then, the campaign has...

Cybersecurity blog - AI graphic

Humans in the Loop

Artificial Intelligence (AI) is gaining ground to assist us in our everyday lives and workplaces. Most are familiar with voice assistants. These devices...

Threat Management

Data Sanitization

Protecting data goes beyond the storage and transfer of information. When you no longer need to keep data how do you ensure the...

Work from home graphic

Update Your Browser

Security updates are often a very important part of a browser update. An out-of-date web browser can open you to serious security flaws...

Tools and resources small banner

Is There a Template For That?

Need to create a policy? Write an Incident Response Plan? Craft a script for automation? You know you are not creating something new...

lady on a laptop graphic

TOS - Yeah Fine, I Agree

Wait! What? We all see these Terms of Service that must be agreed to in order to access a service, website or asset....

Cybersecurity banner

Protect Your Data

Backups are a critical component for an organization to recover data from a hardware/software failure, human error, corruption or ransomware. Follow the rule...

CYBER.org logo

August Funding Opportunities for K-12

MOREnet is pleased to share the availability of two funding opportunities for K-12 schools, aimed improving the cybersecurity resilience of K-12 education communities.

Artificial Intelligence (AI) is here. The barn door has been opened and the horse is out of the stable. Adopters are discovering the...

Cybersecurity banner

Please Do Not Throw Sausage Pizza Away

Open Systems Interconnection Model (OSI) is a framework used to describe the layers and functions of a networking system. First introduced in 1983,...

Social media graphic

Deepfaking: How Bad Actors Are Using It

Deepfakes can be used to persuade, spread disinformation or just be fun. Bad actors are finding ways to use artificial intelligence (AI)...

Summer is the perfect time to utilize your member benefits graphic

Summer is the perfect time to get the most out of your MOREnet Membership Service Package benefits.

Schedule an assessment

Both Cybersecurity Assessments and Network Assessments are included with your Full Membership Service Package.  With both assessments,...

People shaking hands graphic

Are You Watching The Watchers?

Managed Service Providers (MSP) are a critical component for managing networks for many organizations. Due to lack of personnel or expertise, institutions are...

Cybersecurity graphic

AI TRiSM

With the emergence of Artificial Intelligence (AI) the landscape of trust and security needs to be considered. Thus, the development of, yet another...

Employee education small banner

Verizon 2023 Data Breach Investigation Report

Verizon's annual Data Breach Investigation Report (DBIR) is out! Key takeaways indicate that social engineering attacks using (BEC) Business Email Compromise have almost...

Threat Management

What is a Vulnerability?

A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an...

Man presenting at whiteboard graphic

It's NOT Security Awareness Training

Fingernails on a chalk board. That is what this term sounds like to me. I believe awareness is a result of education. Training...

Internet of things banner

Is Your Connected Home Telling Your Secrets?

As the Internet of Things (IoT) continues to evolve, users are expanding their home networks to include these new devices. Most of these...

Secure password strategies graphic

Secure Password Strategies

The foundation to secure passwords strategies is having a strong password. What makes a strong password? Longer=stronger. Even with two-factor/multi-factor (2FA/MFA) implementations, getting...