Tools and resources small banner

The Name Game

Acronym: a word (such as NATO, radar or laser) formed from the initial letter or letters of each of the successive parts or major parts...

Ransomware graphic

Ransomware: Could You Be Next?

Ransomware is a form of malware. Its main purpose is to seize your systems, encrypt your data and basically make your network devices and data unusable....

Ben Colley

Reminiscing With Ben Colley

In a newsletter earlier this year, we asked members to share with us some of their earliest memories of MOREnet. A couple different people mentioned...

April fools

Don't Get Fooled

April 1, April Fools' Day, is a day for jokes and tricks. Many of us have been on the receiving end of April Fools' pranks....

Digital Crook

Data Breach = Data Sold

The value of your personal information is holding steady on the dark web. What kind of information is of value to the cyber criminal? It...

MOREnet logo with school building graphic

Lack of Funding, Lack of Focus, Lack of Security

Security is important, right? Locked doors, video cameras, passwords and wallets. All are important to secure our money, property and data. What comes first in...

Hacking graphic

Another Day. Another Hack.

Breaches, stolen credentials, ransomware. Somewhere in the world it's happening. Stories like these hit the news multiple times a day. Let's take a...

Communications

Gotcha

Free isn't always free. Most of us have had this experience. There always seems to be a catch or an asterisk or "see limitations...

Patching

When Apps Get Sold

What happens when an app or extension you are using gets sold to another party? Many times there is no way of knowing...

Email graphic

It Started with an Email...

BEC-Business Email Compromise. In other words, an email scam that specifically targets companies. The attacker may impersonate or compromise executive emails in an...

Two-factor/multi-factor authentication graphic

The Password Problem

We have been calling users the weakest link because they don't use strong passwords, click on stuff they shouldn't and give away too much sensitive...

MOREnet logo with school building graphic

Data Privacy Day - January 28

Data Privacy Day has its roots in the Council of Europe’s Jan. 28, 1981, passage of the Convention for the protection of individuals...

Internet of things banner

Be Smart About Your Smart Devices

The Internet of Things (IoT) is a term first introduced to us in 1999 by Kevin Ashton during his time at Procter &...

Remote work banner

What Happens When The Workers Return?

During this pandemic we have had to deal with the cybersecurity concerns of remote workers. As stay-at-home restrictions are lifted, many operations will open their...

Cybersecurity graphic

Microsegmentation

Microsegmentation in a network will allow for stronger security controls by dividing the data center into segments. Secure zones are created for very specific workloads....

Permission Click small banner

Where is That Link Really Going?

Did you ever get an email with a link embedded in the text? It could be hidden within the text like this: MOREnet. When...

Cybersecurity graphic

How To Achieve an Effective Cybersecurity Posture

An effective cybersecurity posture is structured to defend against cyberattacks, both intentional and unintentional. This posture will include strong security policies, end-user training and hardware...

Mobile security graphic

Contact Tracing, Security and Privacy

Can technology take the lead in reducing our risks and exposure to the coronavirus? Could tracing who we have been in contact with alert us...

Cyber crime graphic

Lesser Known, but Still Dangerous, Attacks

Denial of Service, phishing and ransomware are well known and documented forms of cyber attacks. They...

MOREnet logo with school building graphic

Cybersecurity Fun

Teaching about cybersecurity doesn’t have to be death by PowerPoint and lectures. There are lots of online resources to help us to learn digital citizenship...