AI Robot

AI and Guardrails

How do you train staff in best practices when entering data into an AI tool whether it is ChatGPT, CoPilot, etc.?

Employee education small banner

Creating a Contact List for Cyber Incident Reporting and Assistance

Cyber criminals continue to organize themselves-- from building scam center office complexes to creating ransomware payment help desks. The more organized, sophisticated and...

Data Privacy Agreements: How to Vet a Resource

Several districts have asked for more detail about how to vet a resource prior to entering a request in the Resource Registry. Below...

Data privacy banner

Data Mapping and Inventory: What they are, How important are they, and How to do them.

Effectively managing your data is critical for compliance, risk reduction, and informed decision-making. Data mapping and inventory are foundational practices for any organization...

Cybersecurity and Accessibility

People with disabilities face an increased risk of being a victim of cybercrime due to the lack of tool...

Next-Gen Phishing Training

New AI-tuned phishing attempts are cause for re-evaluation of user phishing training. With AI chatbots able to assist in the generation of email...

Cyber Security blog banner

The Rise of AI Scams: What You Need to Know to Stay Safe

AI is making scams smarter, faster, and harder to spot. Criminals now use artificial intelligence to create ultra-realistic phishing emails, fake voices, and...

Using AI for Note-Taking

AI Note-Takers are a great time saver and gaining popularity.  The ease of use and ability to produce an agenda and after-action items...

Help Desk person

Vishing 3.0

Cybersecurity threat trends continue to evolve, but seemingly outmoded threats vectors don’t always go away; sometimes, like in the case of vishing, they...

Tax Season AI-Powered Scams Are Targeting You—Here’s How to Stay Safe

As tax season ramps up in 2025, cybercriminals are leveraging cutting-edge technology to launch their most convincing and costly...

“Wi" Should I Log?

Guest wireless is a convenience to offer visitors.  What information should be logged for these connections? 

If someone used the...

Guide for Developing an Internal Vetting Process

Our data privacy team has created a handy guide to help your district develop a process for ensuring every resource with access to...

Ransomware graphic

Cheap (Cybersecurity) Wisdom

Russell Eubanks in a SANS Institute video “Improve Your Cyber Security Culture” offers the following advice learned from one of his own mentors:...

MOREnet logo with school building graphic

The Reality of IoT Security : Guests on Your Network

IoT devices and other vendor appliances, while convenient, are often security weak points. They frequently ship with outdated firmware, weak passwords, and even...

Don’t Just “Google it”

“Google” is now a term embedded in our language and s iroutinely used. As with all routines, we may become complacent on how we...

Breach image

Defining "Reasonable Cybersecurity"

State laws, legal cases, grant requirements, cyber insurance, and those impacted by data exposure all may refer to the term “reasonable cybersecurity” when...

MOREnet logo with school building graphic

A Stitch in Time: Why Patching Should Be on Your Schedule.

In the ever-evolving landscape of cybersecurity, vigilance is paramount. While firewalls and intrusion detection systems form a strong first line of defense, they...

Higher Education Affordable and Open Educational Resources Conference

The Missouri Affordable and Open Educational Resources Conference (A&OER) planning committee invites you to the 6th annual virtual conference! The MO A&OER Conference...

Phishing graphic

Beware of the 'ishing'

Social Engineering is the use of deception in order to manipulate the victim into performing an action for fraudulent purposes. The bad actor...

Google Workspace Updates

At MOREnet, we are committed to keeping our members informed about the latest developments that may impact their technology experience. Recently, we received...