Blog
Verizon 2021 Data Breach Investigation Report
Verizon's annual Data Breach Investigation Report (DBIR) is out! And, no surprise, the last year saw sharp spikes in pandemic themed phishing, collaboration platform abuse...
What is a Deepfake?
Deepfakes are this century's new approach to photo editing. Through the use of deep-learning artificial intelligence, computer imagery can be programmed to replace one person's...
Cybersecurity Threats and Attacks
There are inherent risks that accompany online activities. These threats can cause financial and reputation damage, disruption of business and legal issues. How can you...
Cyberbullying is Bullying
Bullying is bullying, whether in person or through the use of technology. Cyberbullying takes the act of bullying to higher levels. It used to be...
Defense in Cybersecurity
When operating a motor vehicle, it is important to learn the rules of the road. Becoming acquainted with your car's owners manual can help you...
Digital Spring Cleaning
Spring is in the air! Throw back the drapes, pull the blinds and open the windows. Let the sun shine in. Oh my, there are...
The Name Game
Acronym: a word (such as NATO, radar or laser) formed from the initial letter or letters of each of the successive parts or major parts...
Ransomware: Could You Be Next?
Ransomware is a form of malware. Its main purpose is to seize your systems, encrypt your data and basically make your network devices and data unusable....
Reminiscing With Ben Colley
In a newsletter earlier this year, we asked members to share with us some of their earliest memories of MOREnet. A couple different people mentioned...
Don't Get Fooled
April 1, April Fools' Day, is a day for jokes and tricks. Many of us have been on the receiving end of April Fools' pranks....
Data Breach = Data Sold
The value of your personal information is holding steady on the dark web. What kind of information is of value to the cyber criminal? It...
Lack of Funding, Lack of Focus, Lack of Security
Security is important, right? Locked doors, video cameras, passwords and wallets. All are important to secure our money, property and data. What comes first in...
Another Day. Another Hack.
Breaches, stolen credentials, ransomware. Somewhere in the world it's happening. Stories like these hit the news multiple times a day. Let's take a...
Gotcha
Free isn't always free. Most of us have had this experience. There always seems to be a catch or an asterisk or "see limitations...
When Apps Get Sold
What happens when an app or extension you are using gets sold to another party? Many times there is no way of knowing...
It Started with an Email...
BEC-Business Email Compromise. In other words, an email scam that specifically targets companies. The attacker may impersonate or compromise executive emails in an...
The Password Problem
We have been calling users the weakest link because they don't use strong passwords, click on stuff they shouldn't and give away too much sensitive...
Data Privacy Day - January 28
Data Privacy Day has its roots in the Council of Europe’s Jan. 28, 1981, passage of the Convention for the protection of individuals...
Be Smart About Your Smart Devices
The Internet of Things (IoT) is a term first introduced to us in 1999 by Kevin Ashton during his time at Procter &...
What Happens When The Workers Return?
During this pandemic we have had to deal with the cybersecurity concerns of remote workers. As stay-at-home restrictions are lifted, many operations will open their...