Blog
Cybersecurity Vacation
July and August are typically known as the “summer vacation months” and unfortunately these months also see an increase in cyberattacks. Reduced staffing...
Five Time-Saving Features With Gemini and Gmail
Using the new Gemini feature in Gmail you can quickly become more efficient and more organized. Here are five time-saving features you can...
Reimagining Cyber Tabletop Exercises
Annual cybersecurity incident response tabletop exercises are best-practices and strongly encouraged. Whether this is the organization’s first tabletop or a regular occurrence, consider...
16 Billion Passwords Leaked: What to do
In June 2025, cybersecurity experts uncovered the largest password leak ever—over 16 billion unique passwords exposed and actively traded on the dark web. This massive breach, known as “RockYou2025,” is a clear sign that relying on passwords alone is no longer safe.
Share with Researchers and STEM Faculty
On July 31, we will be hosting the fourth workshop geared toward primarily undergraduate institutions (PUIs) in the state to collaborate on National...
Meet VEX AIM, A New Addition to the MILL!
We're excited to announce that the VEX AIM robot has arrived in our makerspace! This compact, high-tech robot is an ideal addition for educators teaching grades 4–12 in computer science, robotics, technology, or STEM classes.
Too Much of a Good Thing – App Overload
Instruction, assessment platforms, reporting systems and parent engagement solutions are all delivered with applications. With so many resources available for use in the...
MOREnet Annual Conference: Actor and Comedian Rob Riggle Scheduled as Special Guest
Our MOREnet Annual Conference will again be packed with educational sessions and networking. We are packing our tracks for both the instructional and the...
Reputational Harm from Cyber Incidents
“You don’t want to be on that list.” Cybercrime Magazine’s Paul John Spalding and Steve Morgan, Founder of Cybersecurity Ventures discussed how cyber...
MOREnet Joining the eduroam Support Organization (eSO) 2025 Cohort
Eduroam is a secure, global roaming wireless access service that enables wi-fi for students, educators, staff and researchers. Designed for the research and education...
Security Awareness Training is Essential in 2025
As cybersecurity threats evolve, educational institutions remain prime targets, with the human element often representing the weakest link in security. Security awareness training...
Google Resources On The Move!
Heads up teachers, techs and librarians! Two great resources from Google just got new homes and partnerships that are REALLY exciting! ...
Become an AI Leader: New Train the Trainer Course
Curious how to confidently lead AI training in your school or library? This free, self-paced course gives you everything you need—no tech expertise required.
New in Google Classroom: AI-Generated Questions for YouTube Videos
Google Workspace for Education is rolling out powerful new functionality — the ability to automatically generate AI-powered questions for embedded YouTube activities. This...
Creating a Contact List for Cyber Incident Reporting and Assistance
Cyber criminals continue to organize themselves-- from building scam center office complexes to creating ransomware payment help desks. The more organized, sophisticated and...
Data Privacy Agreements: How to Vet a Resource
Several districts have asked for more detail about how to vet a resource prior to entering a request in the Resource Registry. Below...
Data Mapping and Inventory: What they are, How important are they, and How to do them.
Effectively managing your data is critical for compliance, risk reduction, and informed decision-making. Data mapping and inventory are foundational practices for any organization...
Next-Gen Phishing Training
New AI-tuned phishing attempts are cause for re-evaluation of user phishing training. With AI chatbots able to assist in the generation of email...
A Thank You to Teachers — and a Tech-Savvy Self-Care Gift
You spend so much time curating experiences for others. This summer, let technology curate something just for you — whether it’s a relaxing book list, a fresh summer recipe lineup, inspiring podcasts, or outdoor adventures you’ve been craving.
The Rise of AI Scams: What You Need to Know to Stay Safe
AI is making scams smarter, faster, and harder to spot. Criminals now use artificial intelligence to create ultra-realistic phishing emails, fake voices, and...