Preventing Malware (for free) [Actual event was held Wednesday, Jan. 19.]
Do your users still find ways to access malware sites and infect their systems? Join us for a closer look at the number of ways you can prevent malware infections on your network for free.
Helping reduce spam with SPF Records
Have you ever had one of your user's accounts be used to send spam? If so, that user will get Non-Delivery Reports and angry e-mail responses, even though they did nothing, other than own the e-mail account. Creating an SPF record can help resolve some of these issues. Join us this month as we talk about SPF records, what they are, how they work and why your organization might want to use them.
Protecting your home wireless network
This is part 4 of our 4 part series this month during CyberSecurity Awareness Month.
It used to be that only geeks and nerds had networks at home. With the explosion of portable devices, even grandparents have home wireless networks! But, how many people are protecting their wireless networks? Why would you want to protect your wireless? Do you really have anything to lose? The answer is YES! Join us this week as we show you things EVERYONE should do to protect their network. It just might keep you from getting a visit very early in the morning from someone in dark clothes and the letters FBI on their back.
Protecting your bookkeeper and other key officers
This is part 3 of our 4 part series this month during CyberSecurity Awareness Month.
We have seen targeted attacks at school and library bookkeepers and other key officers within member organizations. It is important to protect these systems and the valuable information they contain. Join us this week as we talk about security controls that each organization should consider for their key financial workstations.
Protecting yourself during your on-line shopping experience
This is part 2 of our 4 part series this month during CyberSecurity Awareness Month.
Christmas shopping is just around the corner. No one wants to fall victim to identity theft or lose money due to unsafe on-line shopping habits. Join us this week as we talk about safety precautions everyone should use when shopping on-line.
Protecting your banking stuff at home
This is part 1 of our 4 part series this month during CyberSecurity Awareness Month.
Just about everyone banks on-line. However, not many banks or credit cards tell you all the things you need to keep yourself safe as you do your on-line banking. Join us this week as we talk about how to protect your banking information when you do on-line banking at home.
Security Awareness and preparation for Cyber Security Awareness Month
Join us this month as we discuss Security Awareness ideas and how you can use them with your organization. Security is EVERYONE's responsibility, especially the end user. Come and find out ways to get that point across.
Blackhole DNS - How it works and how we get the data to create it
Join us this month as we talk about the free MOREnet Blackhole DNS service. We will talk about how it works, why it works and how to test whether a site is on the list or not. We will also give you a look into how we create this list that is highly effective at helping keep your organization owned equipment safe from browse-by attacks and other badness on the Internet.
Make the World Go Away
This session will show you how to reduce your attack surface and exposure, effectively "make the hackers of the world go away". This will be applicable to a variety of technologies from Web servers to e-mail servers to firewalls.
Many members have used these tactics to limit their Webmail server logins to US-only addresses, to stop systems from being abused following a phishing exploit against one of the users of the mail system.
Software Restriction Policies
If you use Windows workstations, you have no doubt encountered at least one malware infected system. We will demonstrate how to quickly and easily setup a local Windows Software Restriction Policy that will keep many pieces of malware from running on your systems. We will look at both Windows XP and Windows 7, as there are different methods for some versions of Windows 7.
Securing SSHD - Part 2
This is part 2 of a 2 part series. We will look at more sophisticated ways that MOREnet members should be securing SSHd services that are exposed to the public Internet.
Securing SSHD - Part 1
This is part 1 of a 2 part series. We will look at the ways that MOREnet members should be securing SSHd services that are exposed to the public Internet. This will be the introduction and may be a review for some. We recommend at least viewing the first few minutes to see the agenda and determine if you already possess the skill set expected for the second part.
MOREnet Security Services Overview
We will talk about recent efforts we have made to stop the drive-by malware infections and some additional changes that are coming. Members may need to make some changes on their network in order to take advantage of all of the proactive efforts we are making. Tune in to find out what new things are happening.
Missouri Data Breach Disclosure Law
We will give an overview of the newly enacted Missouri Data Breach Disclosure Law. We will look at examples of how this might impact MOREnet members.
Google Hacking: Part 3
Did you know attackers can use search engines to find vulnerable systems? The third installment of our Google Hacking series will show you how to construct queries that may expose vulnerabilities on your network.