Network history banner

Assessments, Threats, Compromises and MORE: MOREnet Cybersecurity Numbers!

For FY25, we visited 16 sites to conduct cybersecurity assessments! These are informal discussions on your best practices, and you will receive a scored assessment and suggestions for improvement.

A Guide to Cybersecurity Threat Statistics from National and International Reports

Looking to create a data-informed information security program? A number of annual reports provide statistics by industry, type of threat, and more. Here...

Phone and computer with padlocks on them.

Five things you can do to mitigate the threat of ransomware attacks:

Ransomware is one of today’s most disruptive cyber threats, but its impact can be greatly reduced with the right defenses. By maintaining reliable backups, enforcing multi-factor authentication, keeping systems patched and updated, training users to recognize phishing attempts, and having a well-practiced incident response plan, organizations and individuals can significantly strengthen their resilience and recover quickly if an attack occurs.

Email graphic

Scam Email Evaluation Sans Sandbox

Don’t have a sandbox available for analysis of a phishing attempt? Here are ways to analyze and better understand email scams.

Cybersecurity banner

Improving Defenses with Professional Development

Cybersecurity is no longer just the responsibility of the IT department; it’s a collective duty that involves every staff member, teacher, and student....

Computer screen with phishing hooks

Mitigating a Successful Phish

MOREnet Security has seen an increase in the number of successful email phishes and to help districts mitigate, we’ve put together the following...

The Power of Reporting: Strengthening Cyber Resilience Through Improving Report Rates

“I just delete” is a common refrain with users who receive phishing email attempts.  While deleting a message is safer than interacting with...

Social Media update

Security Awareness Training is Essential in 2025

As cybersecurity threats evolve, educational institutions remain prime targets, with the human element often representing the weakest link in security. Security awareness training...

Next-Gen Phishing Training

New AI-tuned phishing attempts are cause for re-evaluation of user phishing training. With AI chatbots able to assist in the generation of email...

Cyber Security blog banner

The Rise of AI Scams: What You Need to Know to Stay Safe

AI is making scams smarter, faster, and harder to spot. Criminals now use artificial intelligence to create ultra-realistic phishing emails, fake voices, and...

Help Desk person

Vishing 3.0

Cybersecurity threat trends continue to evolve, but seemingly outmoded threats vectors don’t always go away; sometimes, like in the case of vishing, they...

Tax Season AI-Powered Scams Are Targeting You—Here’s How to Stay Safe

As tax season ramps up in 2025, cybercriminals are leveraging cutting-edge technology to launch their most convincing and costly...

Breach image

Defining "Reasonable Cybersecurity"

State laws, legal cases, grant requirements, cyber insurance, and those impacted by data exposure all may refer to the term “reasonable cybersecurity” when...

Phishing graphic

Beware of the 'ishing'

Social Engineering is the use of deception in order to manipulate the victim into performing an action for fraudulent purposes. The bad actor...

Cybersecurity graphic

CIS Critical Controls Version 8.1

The Center for Internet Security (CIS) has long been respected for it's framework of critical security controls. Released in 2008, it's purpose was...

Cybersecurity blog - two-factor authentication

Lock It Down. Password Essentials.

Passwords. Ugh! Everyone hates them. All the rules!

Incident Reporting: Your First Line of Defense

Organizations use layered security to prevent falling victim to a cybersecurity incident. The 3 main elements of layered security require administrative, physical and...

Ring in the New Year with a Cybersecurity Makeover

A new year brings new opportunities. What a great time to review your cybersecurity practices! Evaluate every aspect of your digital life. Check...

Cybersecurity blog banner - beware phishing scams

Caught in the Web: Common Cyber Crimes

Cyber crime is a broad term that can encompass a wide variety of malicious activity. These attacks can be aimed at networks, businesses...

Salt Typhoon Cyber Attack

The Salt Typhoon cyber attack, conducted by bad actors in China, targeted telecommunication organizations. Major telecom companies were hacked, including AT&T, Verizon, T-Mobile...