Digital Crook

Ransomware-as-a-Service (RaaS)

This business model has ransomware-as-a-service (RaaS) developers selling or leasing malware to affiliates on the dark web. RaaS providers make arrangements with cyber criminals to...

Cybersecurity Assessment small banner

The Essential 18-CIS Critical Controls v8

Just released on May 18, is the eighth iteration of the Center of Internet Security Critical Controls. Previously, these 20 controls, based on best practices, aimed to...

Cyber crime graphic

Verizon 2021 Data Breach Investigation Report

Verizon's annual Data Breach Investigation Report (DBIR) is out! And, no surprise, the last year saw sharp spikes in pandemic themed phishing, collaboration platform abuse...

Social media graphic

What is a Deepfake?

Deepfakes are this century's new approach to photo editing. Through the use of deep-learning artificial intelligence, computer imagery can be programmed to replace one person's...

Virus cybersecurity banner

Cybersecurity Threats and Attacks

There are inherent risks that accompany online activities. These threats can cause financial and reputation damage, disruption of business and legal issues. How can you...

Earthquakes

Earthquakes and Customer Service: A reflection on the early days of networks and consulting at MOREnet

During the wild west days of cable pulling and plugging in old computers to utilize a free firewall, Patti Jones was a history and science...

Cyberbullying graphic

Cyberbullying is Bullying

Bullying is bullying, whether in person or through the use of technology. Cyberbullying takes the act of bullying to higher levels. It used to be...

Device Management banner

Defense in Cybersecurity

When operating a motor vehicle, it is important to learn the rules of the road. Becoming acquainted with your car's owners manual can help you...

Social Media update

Digital Spring Cleaning

Spring is in the air! Throw back the drapes, pull the blinds and open the windows. Let the sun shine in. Oh my, there are...

Tools and resources small banner

The Name Game

Acronym: a word (such as NATO, radar or laser) formed from the initial letter or letters of each of the successive parts or major parts...

Ransomware graphic

Ransomware: Could You Be Next?

Ransomware is a form of malware. Its main purpose is to seize your systems, encrypt your data and basically make your network devices and data unusable....

Ben Colley

Reminiscing With Ben Colley

In a newsletter earlier this year, we asked members to share with us some of their earliest memories of MOREnet. A couple different people mentioned...

April fools

Don't Get Fooled

April 1, April Fools' Day, is a day for jokes and tricks. Many of us have been on the receiving end of April Fools' pranks....

MOREnet logo with school building graphic

Reminiscing on 30 Years: A Videoconferencing Vision

The early years of the videoconferencing group at MOREnet have been likened to mission control for a space flight. All the parts had to move...

Digital Crook

Data Breach = Data Sold

The value of your personal information is holding steady on the dark web. What kind of information is of value to the cyber criminal? It...