Blog
Are You Snipe Hunting?
Threat hunting involves proactively seeking out cyber threats that may have slipped into your network. If a cyber crook slips past your defenses and finds...
Americans Worried About Online Data Security - But Maybe Not Enough
Safeguarding your personal data in a digital age is a problem for everyone. A poll by Ipsos on behalf of Google found that 84% of...
Don't Get Hooked!
Phishing awareness education can save money and reputation, protect assets and keep you from becoming front page news. Phishing is a social engineering technique used by...
Endpoint Protection: Do You Need It?
What is endpoint protection? Simply stated, it is the defenses that are enabled on end user devices. Some solutions are no cost. Some are low...
Threat Modeling
Identifying vulnerabilities and potential security threats while weighing the impact on an organization will assist with prioritizing how to address these weaknesses. This is threat modeling. Primarily...
Apps and Privacy
There's an app for everything! These apps bundle features together to make it more accessible to the mobile user. There are millions of apps, and...
Getting the Most Out of Cybersecurity Conferences
One of the biggest reasons security professionals attend conferences is to learn from experts in the field about new innovations. Networking and knowledge gathering are...
Verizon 2022 Data Breach Investigation Report
Verizon's annual Data Breach Investigation Report (DBIR) is out! Key takeaways indicate that ransomware, supply-chain threats and human error are prevalent threats. Now in its...
Is Ransomware Your Biggest Fear?
Ransomware is bad. Cyber crooks can seize your network, encrypt your files, render your devices useless and demand payment to reverse the damages. As destructive...
Malware Focus: Facestealer
Facestealer is malware hidden in apps that appear to look harmless. The intent is to steal credentials for popular social media sites. Researchers have discovered...
Job Offer Scams
As the fiscal year 2022 comes to a close there are many folks looking for new career opportunities, maybe adding some extra cash while taking...
How Do You Celebrate World Password Day?
#WorldPasswordDay is May 5, 2022. Every year on the first Thursday in May, we have an opportunity to promote better habits of password settings and security....
Ensure Readiness for the MSIP 6 Standard on Cybersecurity and Privacy
MOREnet is providing this information and guidance, in consultation with the Department of Elementary and Secondary Education (DESE), to assist districts and charters...
More About Phishing
There are so many angles of phishing. Getting phished is dangerous; it can rob you of personal information, reputation and money. There are different levels...
Spam: A Brief History
Annoying. That is the first word that comes to mind when thinking about spam. Prior to email, we referred to the clutter of advertising in...
Connected Kids
Online experiences can by positive and productive for kids. The world is an encyclopedia. Kids can learn about other geographic regions, get answers to questions...
Can We Kill the Password?
There have been decades of discussions about a passwordless society, but the fact is, we use passwords everywhere. Usernames and passwords have been in existence since...
Focus on Malware
Not all malware is ransomware, but all ransomware is malware. Malware is software that is maliciously designed to disrupt or gain unauthorized access to a...
Cybersecurity Best Practices
Cybersecurity threats are becoming more frequent, resourceful and dangerous. It is important for organizations to develop a strong fortress to protect assets, data and people....
Cybersecurity Tools and Resources
Defending against cyberattacks and researching resources to fortify your organization's infrastructure are at the top of the list for IT personnel. Approach this strategy with...