Ransomware graphic

Dancing With the Devil: Ransomware Negotiations

Your important files are encrypted. Many of your documents, photos, databases and other files are no longer accessible because they have been encrypted. A document appears...

Denial of service

DoS, DDoS, TDoS

Denial of Service (DoS). This term is transparent. You want service, it's denied. In technology, a denial of service is a form of cyber attack....

Patching

What is a Zero-day Vulnerability?

Zero-day vulnerabilities are flaws in software security that the vendor has not yet created a patch to fix. Many zero-days are discovered by bug bounty...

Holiday scams graphic

'Tis the Season

The holiday season is upon us. The circumstances we are living in, COVID restrictions plus the high demand/low availability of products, will direct many to...

MOREnet logo with school building graphic

National Cybersecurity Standards

On Oct. 8, 2021, President Biden signed the K-12 Cybersecurity Act of 2021 into law. This law is a response to data security incidents that have...

Cybersecurity Awareness Month

Cybersecurity First

October is Cybersecurity Awareness Month. This week, the focus is on the importance of putting cybersecurity first. Why is cybersecurity important? Because it's everyone's responsibility. We...

Cybersecurity Awareness Month - Careers

Cybersecurity Career Awareness Week

Explore. Experience. Share. October is Cybersecurity Awareness Month. This week, the focus is on cybersecurity careers. Did you know:

  • There are more cybersecurity jobs available than...

Cybersecurity Awareness Month - Phishing

Fight the Phish!

October is cybersecurity awareness month. This week we will focus on phishing awareness. #BeCyberSmart Phishing is one of the most prevalent social engineering attacks. The attacker...

MOREnet logo with school building graphic

Cybersecurity: A Look Back Through the Years

Even before the Internet was a household name, cybersecurity was on the forefront of industry experts’ radar, and questions on how to keep the world...

Cybersecurity Awareness Month

#BeCyberSmart

October is Cybersecurity Awareness Month. This week we will focus on tips to keep you safe online.

Cybersecurity Awareness Month

October is Cybersecurity Awareness Month

Every October we celebrate cybersecurity awareness by reminding ourselves about steps we can take to be #CyberAware. This year's theme, Do Your Part. #BeCyberSmart encourages...

Spot What's Wrong

Spot What's Wrong

October is Cybersecurity Awareness Month. This is a good time to focus on your personal cybersecurity awareness as well as your organization's. Our featured graphic...

Email graphic

Understanding the Spam Trap

You have contacted a major retailer for information about a product or service. They are requesting your email address and maybe a phone number as...

Communications

Browser Security

The interface we use to connect with websites on the Internet is called a browser. All consumer devices have a built in browser, usually specific...

Ransomware graphic

LockFile Ransomware

There's a new ransomware family on the criminal block with a new trick up its sleeve to evade ransomware defenses. LockFile uses intermittent encryption by scrambling...

Patching

Malware Spotlight: IIS Webserver Threat

Malicious modules for Internet Information Services (IIS) webserver software have been distributing malware and threatening e-commerce transactions and emails. This type of threat inserts itself...

Phishing graphic

Let's Go Phishing!

One form of social engineering is the fraudulent use of sending emails that pretend to be reputable in order to entice the victim to reveal...

Threat Management

Choosing Your Managed Service Provider (MSP)

Outsourcing many of your IT requirements may be the best way to get a handle on controlling IT management within your organization. MSPs can provide...

Patching

Still Using Default Configurations? STOP!

Networking hardware, end user devices, switches, Wi-Fi, IoT and more all come with a default configuration, making it easier for the consumer to get them...

Patching

CIS Controls v8 - Implementation Group 1 (IG1)

The Center of Internet Security (CIS) recently released version 8 of the Critical Controls. These controls set to prioritize and provide guidance for organizations to...