Blog

Results 1-12 of 339 results
  1. Happy Retirement, John!

    Happy Retirement, John!

    Happy Retirement, John!To read John’s thoughts as our Chair included in our Information and Impact Report, see this blog post from last month.Our current Council Chair, John Bax, the CIO of Lincoln University, officially retires today. He first ...

  2. Missouri OER Hub

    Missouri OER Hub

    MOREnet, in cooperation with the Missouri Department of Elementary and Secondary Education, has developed the Missouri Open Educational Resources Commons (OER) Hub for Missouri educators at all levels. The content on the hub offers a wide selection ...

  3. October is Cybersecurity Awareness Month

    October is Cybersecurity Awareness Month

    Cybersecurity Awareness Month was first declared in 2004 in an effort to help individuals protect themselves online against threats to technology and data. This year's theme is See Yourself in Cyber. Everyone is responsible for their online behavior. ...

  4. Layered Security

    Layered Security

    No organization is immune to cyber attacks. Cyber criminals often target small- to medium-sized businesses (SMBs) because they find them to be the most lucrative targets. Hackers find SMBs to be vulnerable due to lack of resources to fully defend ...

  5. Google Earth for Science

    Everyone knows you can use Google Earth for geography, but did you know it is also an amazing resource for science? Using the search engine, you can visit known active volcanoes and see a map and description of known volcanic eruptions for the past ...

  6. The Cost of a Data Breach

    The Cost of a Data Breach

    There are many facets of cyber crimes. Some attacks are meant to disrupt normal business activity, while others may aim to steal or encrypt data in an effort to extort money from the victim. Many of these attacks can be perpetrated by purchasing ...

  7. More Cyberbullying: Doxing

    More Cyberbullying: Doxing

    Using social media can be entertaining and educational, connecting us with others. These platforms allow users to share photos, send messages, game with friend, posts blogs and videos and more. Relationships can be formed that can lead to new ...

  8. 2022 H1 Global Threat Analysis Report

    The H1 2022 Global Threat Analysis Report provides detailed insights into network and application attack activity.Highlights of the reportDDoS attacks rise dramaticallyThe first six months of 2022 were marked by a significant increase in DDoS ...

  9. Back to School

    Back to School

    Summer fun is over, and kids are heading back to the classrooms. Pens, papers and electronic devices of all sorts will be accompanying them. They are armed for the learning environment. In terms of cybersecurity, you should be, too.During the ...

  10. Getting to Know Education Technology: The micro:bit

    Most education technology can be intimidating to learn, and that is putting it gently. Many of these learning tools appear to require a degree in computer science or an exhaustive onboarding to understand the tool, not to mention often coming with a ...

Results 1-12 of 339 results