Jeffrey Morris, PhD

Assistant Professor, School of Computer and Cyber Sciences

  • Augusta GA UNITED STATES
  • Department of Computer & Cyber Sciences

Contact

Spotlight

3 min

Hybrid working or setting up shop at home for good? Our experts answer key questions about keeping your home office safe and secure

The modern office has changed. According to some experts, it’s much overdue. For others, the idea of the separation of domestic and professional lives is still something to accept.Either way, with the onset of COVID-19 and as workplaces adjust to life after the pandemic, working from home is the new norm for many people and it’s likely going to stay that way indefinitely for some. With that reality also comes the fact that your home office needs to be just as safe and secure as your former place of work once was.Worry not – we’ve got experts who can help. It’s why we asked Augusta University’s Dr. Jeffrey Morris, assistant professor in the School of Computer and Cyber Sciences, for some easy tips and helpful advice on making that happen.How to separate home or work?The best way to keep work materials safe would be to have a separate device that is used only for work, such as a company-supplied laptop. Since most of us will not have devices supplied to us, the next best would be to use a device that has minimal other use:Try not to use a computer that the rest of the family uses. If others use the computer, create a new user login and use that for work only. Keep all your work files in an encrypted folder. Ensure you have security software installed on the computer you are using for work. Some of the other ways include using a Virtual Private Network, which I’ll address in the next question. What's the best way to secure your connection? Using a Virtual Private Network (VPN) is a must. Hopefully, your work will provide a VPN connection for use. With the spread of cloud data storage, ensuring all connections are secured (the little lock icon in your browser is visible) is a must. If you have a work laptop/computer assigned to you, do you need to take additional steps to secure it while working from home? Much like being in the workplace, the same rules apply:You should log out of the device once you are done working for the day. This prevents accidental use of the computer by others in the home. Turning the device off when not in use is a good way to ensure this. The device needs to be physically secured as well. If the device does not have an anti-virus software program installed from work, you need to ensure it has it before you use it at home. What are the biggest red flags you should look out for? Be wary of emails. Many people mix their work and personal emails when working from home. You may receive a phishing email to your personal email that is aimed at accessing your work email and computers. Cybercriminals are aware that many people are working from home and trying to gain access to company networks by breaking into home computers and waiting for the user to log into company networks or cloud storage. And don’t forget … Updates. Do them as often as possible.Keep your computers updated. This includes not only the operating system but all the other programs installed on the machine. Cybercriminals are targeting all the other software on the computers as the operating systems are getting harder to exploit. There are programs available that can inventory the software on a computer and tell you which programs need updating.Looking to know more? Then let us help. Dr. Jeffrey Morris is an assistant professor at Augusta University’s School of Computer and Cyber Sciences. He’s available to speak about keeping your home office safe – simply click on is icon now to arrange an interview today.

Jeffrey Morris, PhD

Multimedia

Social

Areas of Expertise

Quantum Cryptography
Quantum Computing
Defense and Security
Systems Engineering
National Security
Cybersecurity

Education

Air Force Institute of Technology

Ph.D.

Systems Engineering

2014

National Defense Intelligence College

M.S.

Strategic Intelligence

2007

Nova Southeastern University

M.S.

Management Information Systems

2006

Show All +

Affiliations

  • Institute of Electrical and Electronics Engineers (IEEE) : Member
  • International Council on Systems Engineering (INCOSE) : Member
  • Information Systems Security Association (ISSA) : Member
  • Tau Beta Pi – The Engineering Honor Society : Member
  • Sigma Iota Epsilon – National Honorary and Professional Management Society : Member

Media Appearances

Scan scams? Some QR codes may pose security risk

WALB  tv

2024-01-05

It’s something we use at restaurants, art galleries and many other places: QR codes. They’re as easy as scanning from our camera or an app and then clicking the link to what we need. But what if scammers and hackers start putting fake QR codes out to the public? That’s what we asked a Georgia professor about.

And doctor, you’re saying now that you’re seeing some dangers in the QR codes that people see everywhere?

“Yes, QR codes are everywhere,” Dr. Jeff Morris with the Augusta University Cyber Sciences program, said. “They’re easy to use, but none of us natively speaks QR code. It’s not a, not something that we humans can read. So we rely on our phones and our computers to do it for us. There’s been instances where malicious actors have planted out QR codes that send people to malicious sites, printed them out, and then gone into public places and pasted their QR codes over. Posters and other places where QR codes have. Have been posted and then people thinking that they’re going to the right place, bring them up, hit the OK on the phone and then next thing you know, they’re they’ve got a whole bunch of malware downloaded onto their phone.”

View More

A cyber expert’s advice on keeping our data safe

WJBF  tv

2023-06-01

We look at ways to protect your personal information on this edition of The Means Report. Cyber expert Dr. Jeffrey Morris is our guest. He walks us through the many ways we can protect our passwords, our data and other information stored on our devices. Watch our interview and learn how to stay safe when you’re online. Be sure to join us for The Means report Monday afternoons at 12:30 on WJBF NewsChannel 6.

We welcome back Dr. Jeffrey Morris from Augusta University School of Computer and Cyber Sciences. Dr. Morris, thanks for talking to us about cyber. It impacts all of us and thanks for coming back so soon. I really appreciate it.

View More

One on One with Richard Rogers│Seeking protection against cyber attacks

WRDW  tv

2021-10-04

Like it or not, our lives are closely connected to our computers and there are so many ways cyber thieves can target us these days. October is Cyber Security Awareness Month and Jeff Morris with the School of Computer and Cyber Sciences at Augusta University stopped by to talk to us about the importance of keeping our information secure.

View More

Show All +

Answers

If you have a work laptop/computer assigned to you, do you need to take additional steps to secure it while working from home?
Jeffrey Morris, PhD

Much like being in the workplace, the same rules apply:You should log out of the device once you are done working for the day. This prevents accidental use of the computer by others in the home.Turning the device off when not in use is a good way to ensure this.The device needs to be physically secured as well.If the device does not have an anti-virus software program installed from work, you need to ensure it has it before you use it at home.

What's the best way to secure your computer connection at home?
Jeffrey Morris, PhD

Using a Virtual Private Network (VPN) is a must. Hopefully, your work will provide a VPN connection for use. With the spread of cloud data storage, ensuring all connections are secured (the little lock icon in your browser is visible) is a must.

How do you separate home from work when it comes to keeping computers safe? 
Jeffrey Morris, PhD

The best way to keep work materials safe would be to have a separate device that is used only for work, such as a company-supplied laptop. Since most of us will not have devices supplied to us, the next best would be to use a device that has minimal other use:Try not to use a computer that the rest of the family uses.If others use the computer, create a new user login and use that for work only.Keep all your work files in an encrypted folder.Ensure you have security software installed on the computer you are using for work.

Articles

Cyber Talent for Unified Land Operations

Small Wars Journal

2016
The Army is well on path to build their required portion of the US Cyber Command’s Cyber Mission Force to meet strategic objectives. It’s now time to address the impending need for cyber-enabled tactical operations and Service demands. Our strategy should be focused on the ways and means of creating an organization that allows the Army to lead in this domain while achieving the Combatant Commander’s objectives, enabling Army operations across a full spectrum of combat in support of all levels of command.

View more

Cyber Aptitude Assessment: Finding the Next Generation of Enlisted Cyber Soldiers

Cyber Defense Review

2015
As noted in the 2013 DoD Cyberspace Workforce Strategy, not all cyberspace personnel will have a STEM background, but instead will come from a broad variety of backgrounds. The problem is trying to find personnel having the knowledge and aptitude for cyberspace operations. There are many instruments available to measure knowledge, but there few that measure aptitude.

View more

Implications of Quantum Information Processing On Military Operations

Cyber Defense Review

2015
This paper discusses the benefits and drawbacks of quantum computing and quantum cryptography, subsets of the field of Quantum Information Processing (QIP). This field uses quantum mechanics for information processing rather than classical mechanics and portends game-changing implications to technologies long-relied on by military organizations, including computing, communication, and cryptographic systems.

View more

Show All +