MOREnet logo with school building graphic

Digital Assets

Have you ever considered what you should do with your digital assets in the case of your death? What information will your loved ones need...

MOREnet logo with school building graphic

It Can't Happen to Me

Data breaches, ransomware, viruses, credential theft. These are all unfortunate risks associated with online activity. Hopefully you will never have to experience a security breach...

MOREnet logo with school building graphic

How Does Your Cybersecurity Stack Up?

As we begin a new year we start to evaluate many aspects of our lives. We examine our careers, relationships and health. We plan for...

MOREnet logo with school building graphic

Zero-Day Vulnerability

A zero-day vulnerability is an unintended flaw in software security for which the vendor has not yet created a patch to fix it. The term...

MOREnet logo with school building graphic

Reporting SPAM and Phishing

SPAM and phishing emails make their way into our inboxes every day. Spam emails are annoying and generally unsolicited. Mostly benign, they can be...

MOREnet logo with school building graphic

Cybersecurity Online Tools

During the holiday season MOREnet Cybersecurity wants to give you the gift of online security resources that can assist you, your staff and your organization....

MOREnet logo with school building graphic

Email Spoofing

Email spoofing is forging the ‘from’ address of a sender. A spoofed email may appear to be a trusted sender but in fact is a...

MOREnet logo with school building graphic

Whose Responsibility is it to Secure IoT?

IoT (Internet of Things) comes with security risks. But who is responsible for locking it down? The manufacturer? The Government? The organization? The end...

MOREnet logo with school building graphic

An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates,...

MOREnet logo with school building graphic

'Tis the Season...

‘Tis the season to be wary. The Grinches seem to multiply during the holiday season. Responding to some of these phishes can lead to identity...

MOREnet logo with school building graphic

What's in a Name?

Alexa. The 39th most popular girls name in 2006 has created some problems in today’s Internet of Things world. “Alexa, do you need a tissue?” An innocent...

Denial of Service attack small banner

DDoS for Hire

DDoS-As-A-Service. DDoSaaS. A Distributed Denial of Service is a malicious attempt to stress a network or server by overloading it with massive amounts of data....

MOREnet logo with school building graphic

Ransomware: Anatomy of an Attack

Ransomware is on the rise. This malicious software is designed to block access to a computer system and it’s files unless a ransom is...

No Cyberbullying graphic

Cyberbullying

Cyberbullying is bullying. The difference is that cyberbullying is bullying through the use of technology. Various forms of technology could be social media, text messaging...

MOREnet logo with school building graphic

Malware Focus: Rootkits

A rootkit is simply a set of tools that can maintain root privileged access to an operating system. BUT if a rootkit is deployed as...

MOREnet logo with school building graphic

Do You Need Antivirus Software?

Do you still need antivirus software? Yes. Why? Because malware, in all forms, is still pervasive on the Internet and it wants to attack you,...

MOREnet logo with school building graphic

Scam Focus: Gift Card Purchase

Scenario: Donna is the supervisor of XYZ.org. Sam is an upper management employee. ******************************************************************** From:  Donna Boss <DonnaBoss@scammer.com> To: Sam Scammed <SamScammed@XYZ.org> Subject: Quick Purchase Needed Sam, can...

MOREnet logo with school building graphic

A Few of Our Favorite Things

This week we will focus on some great resources that you should be looking at on a regular basis. If you don’t have an RSS...

MOREnet logo with school building graphic

Malware Focus: Dridex

Dridex is a form of malware, spread through the use of email, whose main goal is stealing banking credentials through the use of macros...

MOREnet logo with school building graphic

Internet Fraud

Internet fraud is an unfortunate byproduct of having worldwide access to resources, products and information. Among these risks are phishing scams, malware and...