Blog

Results 1-12 of 132 results
  1. DNS Hijacking

    DNS (Domain Name System) hijacking is a tactic used by cyber criminals to trick the users into thinking they are visiting a legitimate website. The user may enter in the name of a website they wish to visit but the crook has taken control and instead ...

  2. Cleaning Your Laptop

    Cleaning Your Laptop

    Over time your laptop can be come dirty from use and may need cleaning. Cleaning your laptop is not hard and does not require special chemicals to keep it clean,. Do Prior to cleaning your laptop close out of applications and turn off the laptop ...

  3. Gale Resources During COVID-19 Pandemic

    These tools are available to all Missouri libraries, regardless of whether they're Gale subscribers. Gale is making available a comprehensive online toolkit that provides several support materials to help optimize existing resources, enhance ...

  4. EBSCO Offering Trial Resources Through June 30, 2020

    In an effort to help with access to an in-depth variety of resources, EBSCO has given all of our members additional online resources through June 30. Business Searching https://search.ebscohost.com/login.aspx?authtype=ip,uid&profile=bsi Includes ...

  5. Online Resources Remote Access

    MOREnet has worked with EBSCO Publishing to make remote access more easily available, so you can better serve the needs of your students, patrons, staff and faculty with remote access to EBSCOhost and LearningExpress Library. EBSCOhost All ...

  6. Getting an Internet Connection at Home

    Internet connectivity was the first service MOREnet offered back in the early 90s. Members with Internet connectivity through us receive network and threat monitoring, connection management, E-rate assistance, cybersecurity support, DDoS mitigation, ...

  7. Privileged Access Management

    Privileged Access Management (PAM) refers to a class of solutions that help secure, control, manage and monitor privileged access to critical assets. ~ The Secret Security Wiki PAM integrates strategies that can assist security teams to gain more ...

  8. Community Use of Wi-Fi Networks Supported by E-rate Confirmed by the FCC

    Community Use of Wi-Fi Networks Supported by E-rate Confirmed by the FCC

    E-rate, more formally known as the Universal Service Program for Schools and Libraries, provides discounts for telecommunication, Internet access and internal connections to eligible schools and libraries. Discounts range from 20-90 percent, based on ...

  9. IT Management of Remote Workers

    The ability to work remotely is a huge advantage of our technology today. Many tasks can be accomplished successfully and efficiently through remote access. Studies have shown that remote workers have more job satisfaction and experience less stress. ...

  10. Resources for Remote Learning

    In response to our members who had questions about the resources available as K-12 schools in Missouri quickly shift to remote learning, we hosted a virtual brown bag huddle to discuss resources and tools, while sharing support. Here are some of the ...

  11. Ransomware and Cloud Backups

    Ransomware is an increasingly popular means for cyber criminals to extort money from users and organizations. As a result, emphasis is being placed on mitigations for this attack, specifically, offsite backups. Since the cloud couldn’t be any more ...

  12. Port Fraud – A True Story

    My niece recently made an out of state move for her career. Imagine all of the details that need to be attended to—change of address, selling of real estate, moving furniture and closing local accounts. Then on the other end it is finding a place ...

Results 1-12 of 132 results