Blog

Results 1-12 of 244 results
  1. CIS Controls v8 - Implementation Group 1 (IG1)

    The Center of Internet Security (CIS) recently released version 8 of the Critical Controls. These controls set to prioritize and provide guidance for organizations to secure and mitigate the most prevalent cyber attacks against networks and ...

  2. Ransomware Attacks. How Bad is It?

    Ransomware Attacks. How Bad is It?

    Ransomware attacks have increased in number and strength. Cyber crooks are getting better at infiltrating organizations and launching these assaults. Some of the larger attacks we have seen in the news lately have crippled infrastructures and end ...

  3. Autosaving Passwords Is Not a Good Idea

    Web browsers have a feature built in to help us keep track of passwords. Although meant to be a convenience, the autosave password function of your web browser puts you and your network at risk.It can be a struggle keeping track of all those ...

  4. Close Your Ports!

    Closing open ports will improve your network's security. Why? Is it really a big deal? Read on then you decide. Techs know that IP addresses will communicate via TCP or UDP. Internet services require specific ports in order to function. For example, ...

  5. Celebrating MOREnet 30 Years: The REAL Program

    After a whirlwind first few years connecting higher education and starting to connect K-12 schools in phases, MOREnet began working with the Missouri State Library (part of the Missouri Secretary of State’s office) to develop a new statewide ...

  6. Safe Surfing

    Safe Surfing

    Everyone is cruising the Internet. Whether performing a search on the latest Hollywood gossip, shopping or using social media, we are all surfing. Whether using a mobile device or PC, there are some things you should be aware of in order to have a ...

  7. Cryptocurrency

    Cryptocurrency

    Cryptocurrency is digital money. This virtual currency is secured by cryptography, making it nearly impossible to counterfeit. In a recent conversation with my neighbor, she told me about her investment in XRP (Ripple) cryptocurrency. She seemed ...

  8. Anything-as-a-Service (XaaS)

    Anything-as-a-Service (XaaS)

    This term refers to a broad array of services that can be purchased by the customer. The phrase was defined when companies began serving up their offerings more as a service model rather than a purchase model. It shifts the focus of asset ownership ...

  9. Update Your EBSCO and LearningExpress Links by July 19

    Update Your EBSCO and LearningExpress Links by July 19

    Update your EBSCO and LearningExpress links by July 19 to continue to receive access to these databases.To increase cybersecurity, EBSCO has notified us that beginning on July 19, 2021, EBSCO will upgrade their interfaces and services to use HTTPS ...

  10. Double Extortion Attacks

    Double Extortion Attacks

    A victim of ransomware will find all of their data encrypted. But to add insult to injury, the cyber crook will also collect the data and credentials and then add the threat of releasing or selling the data to the pressure of the ransom demand.This ...

  11. Member Spotlight: Richard Altheide, Missouri Science and Technology

    Member Spotlight: Richard Altheide, Missouri Science and Technology

    Richard Altheide is in telecommunications and network engineering at Missouri Science and Technology and was part of the planning process with MOREnet from the beginning. He sat around the table to brainstorm how we were going to connect the first 13 ...

  12. Ransomware-as-a-Service (RaaS)

    Ransomware-as-a-Service (RaaS)

    This business model has ransomware-as-a-service (RaaS) developers selling or leasing malware to affiliates on the dark web. RaaS providers make arrangements with cyber criminals to attack targets in exchange for a percentage of the ransom. Seekers of ...

Results 1-12 of 244 results