Blog

Results 1-12 of 107 results
  1. Zero-Day Vulnerability

    A zero-day vulnerability is an unintended flaw in software security for which the vendor has not yet created a patch to fix it. The term “zero-day” refers to this newly discovered flaw that has been exposed but the developer has not released a ...

  2. Reporting SPAM and Phishing

    SPAM and phishing emails make their way into our inboxes every day. Spam emails are annoying and generally unsolicited. Mostly benign, they can be compared to the snail mail that clutters our home mailboxes. We get offers from windows and siding ...

  3. Behind the Chevron: Erin Grant

    Behind the Chevron: Erin Grant

    Thoughts on Online Resources and Their Utilization From a MOREnet Staffer As we begin a new decade, let’s continue the important conversation preparing students for their futures. Working at MOREnet, I have had a front row seat to the valuable ...

  4. Cybersecurity Online Tools

    During the holiday season MOREnet Cybersecurity wants to give you the gift of online security resources that can assist you, your staff and your organization. So we have gathered some of our most popular resources and wrapped them up in one tidy ...

  5. What is coding and where do I start?

    With the release of state standards for computer science by the Department of Elementary and Secondary Education (DESE), new and greater emphasis will be placed on computer programming in the future. Programming, or “coding,” is the language of ...

  6. Computing Jobs in Missouri

    The demand for workers who can fill computing jobs in Missouri far outstrips the available computer science graduates. There are currently 8.438 open computing jobs in the state, 2.7 times the average demand in Missouri. In 2017, 1,378 students ...

  7. Email Spoofing

    Email spoofing is forging the ‘from’ address of a sender. A spoofed email may appear to be a trusted sender but in fact is a known, and wildly successful, form of phishing. Scammers may be targeting users in an attempt to steal credentials, trick ...

  8. Free computer science training along I-70 in January

    Free computer science training along I-70 in January

    We are hosting FREE Computer Science Regional Training along the I-70 corridor in January. You can attend a half day or two full days- simply pick the cours(es) that you're most interested in! Visit our computer science training schedule for ...

  9. Computer Science Education Week: Comp Sci Education in Missouri

    According to the The Conference Board, there are more than 8,000 open computing jobs in Missouri, so it's imperative that we teach our kids about computer science. DESE's new Computer Science Performance Standards, which took effect this school year, ...

  10. Whose Responsibility is it to Secure IoT?

    IoT (Internet of Things) comes with security risks. But who is responsible for locking it down? The manufacturer? The Government? The organization? The end user? IoT is a system of interrelated computing devices, mechanical and digital machines, ...

  11. Behind the Chevron: Anissa Lockett

    Behind the Chevron: Anissa Lockett

    Thoughts on Computer Science Standards From a MOREnet Staffer As we prepare our students for the future, we are all finding it abundantly clear how important computer science is to their success in not only academic fields, but also in everyday life. ...

  12. Computer Science Education Week is December 9-15

    Computer Science Education Week is December 9-15

    Computer Science Education Week is December 9-15 this year. Fortunately, there are a variety of free resources that allow for easy entry into coding and are perfect for Hour of Code. Code.org’s hour of code theme this year is a fun one; check out ...

Results 1-12 of 107 results