Blog
Fight the Phish!
October is cybersecurity awareness month. This week we will focus on phishing awareness. #BeCyberSmart Phishing is one of the most prevalent social engineering attacks. The attacker...
Cybersecurity: A Look Back Through the Years
Even before the Internet was a household name, cybersecurity was on the forefront of industry experts’ radar, and questions on how to keep the world...
#BeCyberSmart
October is Cybersecurity Awareness Month. This week we will focus on tips to keep you safe online.
October is Cybersecurity Awareness Month
Every October we celebrate cybersecurity awareness by reminding ourselves about steps we can take to be #CyberAware. This year's theme, Do Your Part. #BeCyberSmart encourages...
Spot What's Wrong
October is Cybersecurity Awareness Month. This is a good time to focus on your personal cybersecurity awareness as well as your organization's. Our featured graphic...
Understanding the Spam Trap
You have contacted a major retailer for information about a product or service. They are requesting your email address and maybe a phone number as...
Browser Security
The interface we use to connect with websites on the Internet is called a browser. All consumer devices have a built in browser, usually specific...
Thirty Years of Acronyms: How Many Do You Remember?
Over the past 30 years we have developed a lot of products and solutions. With many of these new endeavors, MOREnet-specific acronyms have become common...
LockFile Ransomware
There's a new ransomware family on the criminal block with a new trick up its sleeve to evade ransomware defenses. LockFile uses intermittent encryption by scrambling...
Malware Spotlight: IIS Webserver Threat
Malicious modules for Internet Information Services (IIS) webserver software have been distributing malware and threatening e-commerce transactions and emails. This type of threat inserts itself...
Up Your SMARTBoard Game
Hey teachers (and techs)! If you are looking to up your SMARTBoard game this year, check out Lumio. Formerly SMART Learning Suite online, this web...
Let's Go Phishing!
One form of social engineering is the fraudulent use of sending emails that pretend to be reputable in order to entice the victim to reveal...
Choosing Your Managed Service Provider (MSP)
Outsourcing many of your IT requirements may be the best way to get a handle on controlling IT management within your organization. MSPs can provide...
Still Using Default Configurations? STOP!
Networking hardware, end user devices, switches, Wi-Fi, IoT and more all come with a default configuration, making it easier for the consumer to get them...
Why is "Research" in the MOREnet Name?
When the Missouri Research Network (MORNET) launched in 1991, the internet, as we know it, was only getting started. We did not add the "E"...