It Can't Happen to Me

Data breaches, ransomware, viruses, credential theft. These are all unfortunate risks associated with online activity. Hopefully you will never have to experience a security breach...

How Does Your Cybersecurity Stack Up?

As we begin a new year we start to evaluate many aspects of our lives. We examine our careers, relationships and health. We plan for...

Zero-Day Vulnerability

A zero-day vulnerability is an unintended flaw in software security for which the vendor has not yet created a patch to fix it. The term...

Reporting SPAM and Phishing

SPAM and phishing emails make their way into our inboxes every day. Spam emails are annoying and generally unsolicited. Mostly benign, they can be...

Behind the Chevron: Erin Grant

Thoughts on Online Resources and Their Utilization From a MOREnet Staffer

As we begin a new decade, let’s continue...

Cybersecurity Online Tools

During the holiday season MOREnet Cybersecurity wants to give you the gift of online security resources that can assist you, your staff and your organization....

Email Spoofing

Email spoofing is forging the ‘from’ address of a sender. A spoofed email may appear to be a trusted sender but in fact is a...

Whose Responsibility is it to Secure IoT?

IoT (Internet of Things) comes with security risks. But who is responsible for locking it down? The manufacturer? The Government? The organization? The end...

An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates,...

Nice Addition to Google Slides

One of the things users have been asking for in Google Slides is the ability to insert audio. There are a few add...

'Tis the Season...

‘Tis the season to be wary. The Grinches seem to multiply during the holiday season. Responding to some of these phishes can lead to identity...

What's in a Name?

Alexa. The 39th most popular girls name in 2006 has created some problems in today’s Internet of Things world. “Alexa, do you need a tissue?” An innocent...

Denial of Service attack

DDoS for Hire

DDoS-As-A-Service. DDoSaaS. A Distributed Denial of Service is a malicious attempt to stress a network or server by overloading it with massive amounts of data....

Resources for Digital Accessibility

There are a number of laws and guidelines relating to digital accessibility, both on the federal and state levels, and there is a...

Ransomware: Anatomy of an Attack

Ransomware is on the rise. This malicious software is designed to block access to a computer system and it’s files unless a ransom is...