Blog
Browser Security
The interface we use to connect with websites on the Internet is called a browser. All consumer devices have a built in browser, usually specific...
Thirty Years of Acronyms: How Many Do You Remember?
Over the past 30 years we have developed a lot of products and solutions. With many of these new endeavors, MOREnet-specific acronyms have become common...
LockFile Ransomware
There's a new ransomware family on the criminal block with a new trick up its sleeve to evade ransomware defenses. LockFile uses intermittent encryption by scrambling...
Malware Spotlight: IIS Webserver Threat
Malicious modules for Internet Information Services (IIS) webserver software have been distributing malware and threatening e-commerce transactions and emails. This type of threat inserts itself...
Up Your SMARTBoard Game
Hey teachers (and techs)! If you are looking to up your SMARTBoard game this year, check out Lumio. Formerly SMART Learning Suite online, this web...
Let's Go Phishing!
One form of social engineering is the fraudulent use of sending emails that pretend to be reputable in order to entice the victim to reveal...
Choosing Your Managed Service Provider (MSP)
Outsourcing many of your IT requirements may be the best way to get a handle on controlling IT management within your organization. MSPs can provide...
Still Using Default Configurations? STOP!
Networking hardware, end user devices, switches, Wi-Fi, IoT and more all come with a default configuration, making it easier for the consumer to get them...
Why is "Research" in the MOREnet Name?
When the Missouri Research Network (MORNET) launched in 1991, the internet, as we know it, was only getting started. We did not add the "E"...
CIS Controls v8 - Implementation Group 1 (IG1)
The Center of Internet Security (CIS) recently released version 8 of the Critical Controls. These controls set to prioritize and provide guidance for organizations to...
Ransomware Attacks: How Bad is It?
Ransomware attacks have increased in number and strength. Cyber crooks are getting better at infiltrating organizations and launching these assaults. Some of the larger attacks...
Autosaving Passwords is Not a Good Idea
Web browsers have a feature built in to help us keep track of passwords. Although meant to be a convenience, the autosave password function of...
Close Your Ports!
Closing open ports will improve your network's security. Why? Is it really a big deal? Read on then you decide. Techs know that IP addresses will...
Celebrating MOREnet 30 Years: The REAL Program
After a whirlwind first few years connecting higher education and starting to connect K-12 schools in phases, MOREnet began working with the Missouri State Library...
Safe Surfing
Everyone is cruising the Internet. Whether performing a search on the latest Hollywood gossip, shopping or using social media, we are all surfing. Whether using a...
Cryptocurrency
Cryptocurrency is digital money. This virtual currency is secured by cryptography, making it nearly impossible to counterfeit. In a recent conversation with my neighbor, she told...
Anything-as-a-Service
This term refers to a broad array of services that can be purchased by the customer. The phrase was defined when companies began serving up...
Double Extortion Attacks
A victim of ransomware will find all of their data encrypted. But to add insult to injury, the cyber crook will also collect the data...
Member Spotlight: Richard Altheide, Missouri Science and Technology
Richard Altheide is in telecommunications and network engineering at Missouri Science and Technology and was part of the planning process with MOREnet from the beginning....
Ransomware-as-a-Service (RaaS)
This business model has ransomware-as-a-service (RaaS) developers selling or leasing malware to affiliates on the dark web. RaaS providers make arrangements with cyber criminals to...