Blog

Tell Your Favorite College Students: Google Gemini Free Upgrade
Whether college students want help with exam prep, proofreading assistance or step-by-step guidance to find an answer on a homework assignment,

Become an AI Leader: New Train the Trainer Course
Curious how to confidently lead AI training in your school or library? This free, self-paced course gives you everything you need—no tech expertise required.

New in Google Classroom: AI-Generated Questions for YouTube Videos
Google Workspace for Education is rolling out powerful new functionality — the ability to automatically generate AI-powered questions for embedded YouTube activities. This...

Creating a Contact List for Cyber Incident Reporting and Assistance
Cyber criminals continue to organize themselves-- from building scam center office complexes to creating ransomware payment help desks. The more organized, sophisticated and...

Data Privacy Agreements: How to Vet a Resource
Several districts have asked for more detail about how to vet a resource prior to entering a request in the Resource Registry. Below...

Data Mapping and Inventory: What they are, How important are they, and How to do them.
Effectively managing your data is critical for compliance, risk reduction, and informed decision-making. Data mapping and inventory are foundational practices for any organization...

Cybersecurity and Accessibility
People with disabilities face an increased risk of being a victim of cybercrime due to the lack of tool...

Next-Gen Phishing Training
New AI-tuned phishing attempts are cause for re-evaluation of user phishing training. With AI chatbots able to assist in the generation of email...

A Thank You to Teachers — and a Tech-Savvy Self-Care Gift
You spend so much time curating experiences for others. This summer, let technology curate something just for you — whether it’s a relaxing book list, a fresh summer recipe lineup, inspiring podcasts, or outdoor adventures you’ve been craving.

The Rise of AI Scams: What You Need to Know to Stay Safe
AI is making scams smarter, faster, and harder to spot. Criminals now use artificial intelligence to create ultra-realistic phishing emails, fake voices, and...

Unleash Limitless Learning: Upload Your Own Content to Read Along in Google Classroom!
Exciting news for educators! Google Workspace Updates has announced a fantastic new feature for Read Along that will revolutionize your literacy instruction. Now,...

Using AI for Note-Taking
AI Note-Takers are a great time saver and gaining popularity. The ease of use and ability to produce an agenda and after-action items...

Vishing 3.0
Cybersecurity threat trends continue to evolve, but seemingly outmoded threats vectors don’t always go away; sometimes, like in the case of vishing, they...

Tax Season AI-Powered Scams Are Targeting You—Here’s How to Stay Safe
As tax season ramps up in 2025, cybercriminals are leveraging cutting-edge technology to launch their most convincing and costly...

A Front-Row Seat to Creativity at the FIRST LEGO League Challenge Missouri Regional Championship
Judging the FIRST Robotics LEGO League Missouri Regional Championship gave me a front-row seat to the creativity, collaboration, and innovation that will shape the future of STEM.
![]()
Google Workspace Updates
In a recent update posted on March 14, 2025, the Google Workspace team announced a new requirement for Google Workspace for Education administrators...

Cheap (Cybersecurity) Wisdom
Russell Eubanks in a SANS Institute video “Improve Your Cyber Security Culture” offers the following advice learned from one of his own mentors:...

Students ask "What is bias in AI"?
I was recently at the Educators Rising conference at Westminster College in Fulton. This conference is for high school students who are...

E-Rate Filing Window Deadline is Here
The E-Rate form 471 filing period closes March 26, which means the deadline to inform MOREnet of bandwidth increases to be funded in...

The Reality of IoT Security : Guests on Your Network
IoT devices and other vendor appliances, while convenient, are often security weak points. They frequently ship with outdated firmware, weak passwords, and even...
