Blog
Chatting with AI: Do You Need to Use Your Manners?
As the training team and I introduce AI tools to teachers across the state, the most common question is, “Do I need to be nice to it?”. With AI becoming a bigger part of our everyday lives, whether through virtual assistants or educational tools, it's a natural question to ask. Some also wonder, “Will I get a better answer if I’m frustrated or mad at it?”.
Wi-Fi Hotspots Now Included in E-Rate Program
On July 18, the FCC voted to approve the final rules to support digital equity by allowing E-Rate resources to be...
Bots-Friend or Foe?
What is a 'bot'? This refers to a software application that is programmed to perform specific tasks and can do this with or...
FCC Schools and Libraries Cybersecurity Pilot Program
Pilot program established to determine how Universal Service funding can benefit cybersecurity efforts. In June, the FCC adopted a pilot...
Five Ways KIDS (K-20 Interoperable Data Solution) Can Save You Time and Money
You may have heard of MOREnet’s K-20 Interoperable Data Solution (KIDS), but you may not be familiar with all the ways KIDS could...
Controlling the Keys
Your environment has valuables within the data you keep. Managing the access to this sensitive data is crucial to an organization's security. Core...
Cybersecurity Needs YOU!
The cybersecurity industry has been suffering a critical shortage of talent for quite some time. It is reported that there is a...
3D Design in the Classroom: A Quick Teacher Grant Guide
As a new school year begins, Missouri teachers might be looking to bring exciting new tech into their classrooms. A 3D...
Creative Commons, OER and Upcoming Webinar
Creative Commons is a nonprofit organization that oversees a copyright license and a resource for creators. The license allows copyright holders to grant...
Another Day, Another Data Breach
Yes indeed. I have been involved in multiple data compromises; Target, Home Depot, Retirement system, Equifax, Blue Cross/Blue Shield are ones I can...
Comparing MFA Methods: Which One Fits Your Security Needs?
Multi-factor and 2 factor authentication methods were introduced as an additional security measure to protect a user's login. A user will typically...
Vacation Dreams to Nightmare? Stay Safe!
Online booking platforms have become popular for travelers seeking vacation deals for accommodations, flights and car rentals. It's important to recognize that this...
Power Up for the New Year: Back-to-School PD with MOREnet!
The energy of a new school year is contagious! But before the first bell rings, invest in your...
Building Cyber Resilience
Cyber threats are an everyday menace for organizations. It requires significant investments and resources to safeguard the environment; protecting assets, data and people....
Camera-On Meetings are the New Professional Norm
For the last fifteen years, I have taught group fitness classes as a hobby at a local fitness studio. Before the pandemic, if...
The Human Firewall
Cybersecurity fortification goes beyond the hardware and tools. Building a positive, defensive culture within the organization is a vital part of an overall...
Encrypting Files for Evil
Data encryption is important in helping protect confidentiality and integrity of the data. This form of cryptography will take plaintext and transform it...
Oops! Your Passwords Are Showing
Passwords are important to keep accounts private and secure. Keep in mind that you should follow security best practices when using passwords.
Behind the Square
Quick Response (QR) codes have become common place in advertising and communication. Once requiring a special QR code reader, these codes can easily...
Choosing Your Cyber Attack Recovery Site
Having an area where recovery operations can function can sometimes be an important element in recuperation from a cybersecurity incident. There are 3...