Blog

Results 1-12 of 158 results
  1. MOREnet KIDS: The K-20 Interoperable Data Solution

    MOREnet KIDS: The K-20 Interoperable Data Solution

    As key stakeholders in educational institutions make decisions to mold the best learning environment for today’s students, accurate and comprehensive data is crucial to influence the desired outcome. Many of our members currently struggle with ...

  2. EKANS: The Smart Ransomware

    EKANS: The Smart Ransomware

    Ransomware is getting smarter. The EKANS variant has the ability to target potential victims, attacking industrial control systems and then confirming the target by resolving the domain to its IP lists. If the target is not the intended victim, the ...

  3. Four Ways to Improve Your Videos

    Video is one of my favorite ways to create in the classroom. It helps students learn deeper because they present and explain topics and subjects. It also opens a whole new avenue for creativity that many students will enjoy. After your students have ...

  4. Keeping Smart Devices Safe

    Keeping Smart Devices Safe

    We are deep into the age of the Internet of Things (IoT). There are new interconnected devices on the market daily. We can not only find security cameras, refrigerators and thermostats, but now there are appliances and devices that we didn’t even ...

  5. Microsegmentation

    Microsegmentation

    Microsegmentation in a network will allow for stronger security controls by dividing the data center into segments. Secure zones are created for very specific workloads. Traditional physical segmentation through the use of VLANs let you separate ...

  6. Learning "withGoogle" Favorite Resources

    A few years ago, a teacher approached me. She said, "I know how to make a Doc. I use Slides and Forms and Classroom every day. What else is out there?" I had been so focused on teaching the basics, her question really gave me pause. What else IS out ...

  7. Where Is That Link REALLY Going?

    Where Is That Link REALLY Going?

    Did you ever get an email with a link embedded in the text? It could be hidden within the text like this: MOREnet. When you click on the highlighted text it resolves to a hyperlink and directs you to a website. Or it could be clearly printed as ...

  8. How To Achieve an Effective Cybersecurity Posture

    How To Achieve an Effective Cybersecurity Posture

    An effective cybersecurity posture is structured to defend against cyberattacks, both intentional and nonintentional. This posture will include strong security policies, end-user training and hardware and software solutions such as firewalls and ...

  9. Planning for Back to School: Virtual Round Tables June 23-25

    Planning for Back to School: Virtual Round Tables June 23-25

    The fourth quarter of our school year, schools were thrown into distance learning trial by fire. Teachers, students and parents all adjusted to meet the demands of state-wide shelter-in-place orders and federal recommendations. Our members have ...

  10. MOREnet Annual Conference in October

    MOREnet Annual Conference in October

    Delivering content that provides new resources and innovative technology along with offering an outlet for our members to network with your peers have always been major drivers of our MOREnet Annual Conference. Understanding that professional ...

  11. Still Have Windows 7?

    Still Have Windows 7?

    Support and security patches have ended for Windows 7. End of support means that these systems are vulnerable to potential risks and exploits, and if the system is running Windows Security Essentials for anti-virus it also means that it will no ...

  12. Creating  a Scratch Project

    Creating a Scratch Project

    Needing to bring new life into a traditional presentation, trading in the poster board for a digital canvas? Want to give your students a way to showcase their creativity while exploring computer science standards? Scratch utilizes block coding to ...

Results 1-12 of 158 results