MOREnet logo with school building graphic

Ransomware: Anatomy of an Attack

Ransomware is on the rise. This malicious software is designed to block access to a computer system and it’s files unless a ransom is...

No Cyberbullying graphic

Cyberbullying

Cyberbullying is bullying. The difference is that cyberbullying is bullying through the use of technology. Various forms of technology could be social media, text messaging...

MOREnet logo with school building graphic

Malware Focus: Rootkits

A rootkit is simply a set of tools that can maintain root privileged access to an operating system. BUT if a rootkit is deployed as...

MOREnet logo with school building graphic

Do You Need Antivirus Software?

Do you still need antivirus software? Yes. Why? Because malware, in all forms, is still pervasive on the Internet and it wants to attack you,...

MOREnet logo with school building graphic

Scam Focus: Gift Card Purchase

Scenario: Donna is the supervisor of XYZ.org. Sam is an upper management employee. ******************************************************************** From:  Donna Boss <DonnaBoss@scammer.com> To: Sam Scammed <SamScammed@XYZ.org> Subject: Quick Purchase Needed Sam, can...

MOREnet logo with school building graphic

A Few of Our Favorite Things

This week we will focus on some great resources that you should be looking at on a regular basis. If you don’t have an RSS...

MOREnet logo with school building graphic

Malware Focus: Dridex

Dridex is a form of malware, spread through the use of email, whose main goal is stealing banking credentials through the use of macros...

MOREnet logo with school building graphic

Internet Fraud

Internet fraud is an unfortunate byproduct of having worldwide access to resources, products and information. Among these risks are phishing scams, malware and...

MOREnet logo with school building graphic

You've Got Mail!

Phishing is the #1 cause of a compromise. 30% of phishing emails are opened. Business Email Compromise (BEC) scammers netted over $12 BILLION...

MOREnet logo with school building graphic

TLS 1.3

TLS (Transport Layer Security) v 1.3 has recently been approved by the Internet Engineering Task Force (IETF) and the seemingly minor upgrade from version 1.2...

MOREnet logo with school building graphic

Are You Backing Up Your Data?

Backup and restore processes are a critical component of your business continuity and disaster recovery plans. In order to ensure that your process is successful...

MOREnet logo with school building graphic

Malware Focus: TrickBot

TrickBot is a banking Trojan that targets the Windows operating system. The Trojan's focus is to steal banking information and is spread...

MOREnet logo with school building graphic

The Verizon 2019 Data Breach Investigations Report

The Verizon 2019 Data Breach Investigations Report (DBIR) has been released. This report is built on the analysis of over 41,000 security incidents and...

MOREnet logo with school building graphic

Hacked!

Hackers have devious ways of infiltrating your system and stealing your data. Crooks aren’t always after the biggest fish in the sea but instead rely...

MOREnet logo with school building graphic

Combine Assessments and Pay Only One Travel Fee

Combine Assessments and Pay Only One Travel Fee

Summer is a great time to assess your technology infrastructure and make...