According to sources, Northeastern State University (a Education organization in Oklahoma) was hit with a cyber attack. It was first reported on 2023-06-06.

If You're in Oklahoma, You're at Increased Risk

Cybersecurity for Education

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2023-06-06

Northeastern State University Shuts Down Network Over Cyber Threat

“In response to a recent "cybersecurity incident," Northeastern State University has disabled its entire network in order to investigate the issue.“

“On May 29, NSU sent out a message via email and social media notifying the public of a network disruption. NSU followed up with an update to the situation June 1 and announced that early on May 26, the university's IT team became aware of a cybersecurity incident that impacted its network. “

“"Out of an abundance of caution, the IT department disabled the network at 4:30 a.m. on May 26 and began investigating the issue with the assistance of external consultants. At this time, our consultants have found no evidence that NSU data has been stolen," said Jennifer Zehnder, NSU communications director, in the update. "As we move forward, the IT team is methodically working through our network to ensure we can safely reconnect enterprise systems and servers. Systems are coming online at an appropriate pace based upon established priorities." “

“Mabery said the network and Internet-based services are being restored, but that this process takes time. “

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis