Blog
Job Offer Scams
As the fiscal year 2022 comes to a close there are many folks looking for new career opportunities, maybe adding some extra cash while taking...
How Do You Celebrate World Password Day?
#WorldPasswordDay is May 5, 2022. Every year on the first Thursday in May, we have an opportunity to promote better habits of password settings and security....
Ensure Readiness for the MSIP 6 Standard on Cybersecurity and Privacy
MOREnet is providing this information and guidance, in consultation with the Department of Elementary and Secondary Education (DESE), to assist districts and charters...
More About Phishing
There are so many angles of phishing. Getting phished is dangerous; it can rob you of personal information, reputation and money. There are different levels...
Spam: A Brief History
Annoying. That is the first word that comes to mind when thinking about spam. Prior to email, we referred to the clutter of advertising in...
Connected Kids
Online experiences can by positive and productive for kids. The world is an encyclopedia. Kids can learn about other geographic regions, get answers to questions...
Can We Kill the Password?
There have been decades of discussions about a passwordless society, but the fact is, we use passwords everywhere. Usernames and passwords have been in existence since...
Focus on Malware
Not all malware is ransomware, but all ransomware is malware. Malware is software that is maliciously designed to disrupt or gain unauthorized access to a...
Cybersecurity Best Practices
Cybersecurity threats are becoming more frequent, resourceful and dangerous. It is important for organizations to develop a strong fortress to protect assets, data and people....
Cybersecurity Tools and Resources
Defending against cyberattacks and researching resources to fortify your organization's infrastructure are at the top of the list for IT personnel. Approach this strategy with...
Cyber Risk Analysis
A part of developing a cyber-secure environment involves evaluation of the possible risks facing the organization. This is a crucial component of your organization's incident...
How Important is AI to Cyber Defense?
Could artificial intelligence (AI) be the answer to fulfilling our cybersecurity job gaps? AI has become essential to cybersecurity. It has the ability to analyze...
Your Email Address is Personal
Your email address is one of the ways you connect with people electronically, and it can reveal a lot about you. Maybe it's as simple...
Smartphones and Hacks
Got a flip phone? Move on. This blog will be of no use to you. But if you are enjoying the benefits of holding the...
Data Privacy Day - January 28
In 2009, the US House of Representatives formally recognized Jan. 28 as National Data Privacy Day #DPD. Then, Congress took it further by declaring this...
Readjusting Your Cybersecurity Attitude
New Year. New Attitude. Now is the time to take a new look at your cybersecurity practices. Evaluate every aspect of your digital life. Check...
2021: Cybersecurity Year in Review
As we close the door on 2021 there's no shortage of noteworthy cybersecurity stories. Surly we will have learned from some of these incidents and...
Cybersecurity Prediction for 2022
Lather. Rinse. Repeat. This seems to be the theme for cyber incidents we will see in 2022. More of the same we experienced in 2021...
Understanding Copyright Law
The Digital Millennium Copyright Act (DMCA), enacted by the US government in 1998, regulates digital media by protecting it from copyright infringement by users on...