Patching

CIS Controls v8 - Implementation Group 1 (IG1)

The Center of Internet Security (CIS) recently released version 8 of the Critical Controls. These controls set to prioritize and provide guidance for organizations to...

Ransomware graphic

Ransomware Attacks: How Bad is It?

Ransomware attacks have increased in number and strength. Cyber crooks are getting better at infiltrating organizations and launching these assaults. Some of the larger attacks...

MOREnet logo with school building graphic

Autosaving Passwords is Not a Good Idea

Web browsers have a feature built in to help us keep track of passwords. Although meant to be a convenience, the autosave password function of...

MOREnet logo with school building graphic

Close Your Ports!

Closing open ports will improve your network's security. Why? Is it really a big deal? Read on then you decide. Techs know that IP addresses will...

MOREnet logo with school building graphic

Celebrating MOREnet 30 Years: The REAL Program

After a whirlwind first few years connecting higher education and starting to connect K-12 schools in phases, MOREnet began working with the Missouri State Library...

Kids online

Safe Surfing

Everyone is cruising the Internet. Whether performing a search on the latest Hollywood gossip, shopping or using social media, we are all surfing. Whether using a...

Mobile payment apps

Cryptocurrency

Cryptocurrency is digital money. This virtual currency is secured by cryptography, making it nearly impossible to counterfeit. In a recent conversation with my neighbor, she told...

Cybersecurity graphic

Anything-as-a-Service

This term refers to a broad array of services that can be purchased by the customer. The phrase was defined when companies began serving up...

Cyber crook graphic

Double Extortion Attacks

A victim of ransomware will find all of their data encrypted. But to add insult to injury, the cyber crook will also collect the data...

Richard Altheide

Member Spotlight: Richard Altheide, Missouri Science and Technology

Richard Altheide is in telecommunications and network engineering at Missouri Science and Technology and was part of the planning process with MOREnet from the beginning....

Digital Crook

Ransomware-as-a-Service (RaaS)

This business model has ransomware-as-a-service (RaaS) developers selling or leasing malware to affiliates on the dark web. RaaS providers make arrangements with cyber criminals to...

Cybersecurity Assessment small banner

The Essential 18-CIS Critical Controls v8

Just released on May 18, is the eighth iteration of the Center of Internet Security Critical Controls. Previously, these 20 controls, based on best practices, aimed to...

Cyber crime graphic

Verizon 2021 Data Breach Investigation Report

Verizon's annual Data Breach Investigation Report (DBIR) is out! And, no surprise, the last year saw sharp spikes in pandemic themed phishing, collaboration platform abuse...

Social media graphic

What is a Deepfake?

Deepfakes are this century's new approach to photo editing. Through the use of deep-learning artificial intelligence, computer imagery can be programmed to replace one person's...

Virus cybersecurity banner

Cybersecurity Threats and Attacks

There are inherent risks that accompany online activities. These threats can cause financial and reputation damage, disruption of business and legal issues. How can you...