Blog
Pumping the Brakes on AI
Artificial Intelligence (AI) news has been exploding in the last couple of weeks. Technology leaders are weighing in with their opinions and recommendations...
Artificial Intelligence (AI) in the Future of Cybersecurity
Artificial Intelligence has been making headlines with the emergence of ChatGPT, a conversational chatbot created by OpenAI. This model was trained to use...
Data Privacy
As more components of our daily lives move online, schools and institutions are more reliant upon data, technology and online tools and resources to support...
Student Privacy
- Privacy Laws and Awareness
- The Educator’s Guide to Student Data Privacy – Future of Privacy Forum
- Vetting Software
- Evaluating...
Privacy Best Practices
When developing a data privacy program, there are a variety of steps that will make setting this up run...
Blocksi
Blocksi, a Google for Education partner, is dedicated to providing an innovative and powerful all-in-one cloud-based multi-OS content filtering and classroom screen monitoring...
Student Data Privacy
What are you doing to protect your students' data? Do you know what type of information is being collected and used by the...
Effects of Blocking GNN Ports
Blocking these ports may affect:
- Access to Microsoft Exchange servers over the Internet using MS Outlook (blocking these ports will not affect using MS Outlook...
Akamai Secure Internet Access
Join us for a conversation with Connie Coy, Cybersecurity Analyst with MOREnet, as we discuss an excellent tool for network security and content filtering.
Break the Chain
Remember the chain letter? You know, the message you sent to 20 friends, urging them to send to 20 of their friends? You may need...
What is a Supply Chain Attack?
Supply chain attacks occur when a miscreant targets a trusted third-party vendor who is offering services or software to an organization. An unsecure supplier in...
Don't Blame the Human
Humans are often thought of as the weakest link in the cybersecurity chain. End-user training and education is crucial to help condition users to recognize...
Domain Slamming
Domain scams are attempts to trick organizations into subscribing to a domain registration service. The owner of the domain may think that they are merely...
'Tis the Season
Holiday shopping has begun. Post-pandemic, more stores are opening their doors, but the high demand and low availability of products still exists. If you choose to...
Is MFA the Answer?
Passwords to accompany a log in for access to a website or account was considered a security measure that would keep folks out who had...
Cybersecurity Awareness Month Wrap Up
Cybersecurity Awareness Month has come to a close. We have given you tips to help you #SeeYourselfinCyber and strengthen your safe security practices. This annual...
Cybersecurity Awareness Month - Week Four
This year's theme is "See Yourself in Cyber" and focuses on the people aspect of cybersecurity. We can all do our part to keep ourselves,...
Cybersecurity Awareness Month - Week Three
This year's theme is "See Yourself in Cyber" and focuses on the people aspect of cybersecurity. We can all do our part to keep ourselves,...
Cybersecurity Awareness Month - Week Two
This year's theme is "See Yourself in Cyber" and focuses on the people aspect of cybersecurity. We can all do our part to keep ourselves,...
Cybersecurity Awareness Month - Week One
This year's theme is "See Yourself in Cyber" and focuses on the people aspect of cybersecurity. We can all do our part to keep ourselves,...