Blog
Password Managers and you
Passwords protect everything, from student records and payroll systems to library accounts and classroom tools. Yet most people reuse the same passwords across...
Documentation is Key!
If you’ve taken advantage of our cybersecurity assessments, you know a common question we have for every area is – Is this documented? ...
The Twelfth Person – Leveraging Staff to Gain an Advantage Over Cyber Adversaries
Those who follow (or play) football know an engaged, active and loud home crowd provides a homefield advantage similar to an extra player,...
Trust but verify: defending against deep fakes
AI-driven impersonations and deepfake attacks are rapidly reshaping the cybersecurity threat landscape for global enterprises, with losses in the first quarter of 2025...
E-Rate Category Two (C2) Budget Cycle (New in FY26-27)
The new five-year cycle for the C2 budget has started and will run through funding year 2030. In June 2025, the FCC Wireline Competition...
Assessments, Threats, Compromises and MORE: MOREnet Cybersecurity Numbers!
For FY25, we visited 16 sites to conduct cybersecurity assessments! These are informal discussions on your best practices, and you will receive a scored assessment and suggestions for improvement.
A Guide to Cybersecurity Threat Statistics from National and International Reports
Looking to create a data-informed information security program? A number of annual reports provide statistics by industry, type of threat, and more. Here...
Five things you can do to mitigate the threat of ransomware attacks:
Ransomware is one of today’s most disruptive cyber threats, but its impact can be greatly reduced with the right defenses. By maintaining reliable backups, enforcing multi-factor authentication, keeping systems patched and updated, training users to recognize phishing attempts, and having a well-practiced incident response plan, organizations and individuals can significantly strengthen their resilience and recover quickly if an attack occurs.
Scam Email Evaluation Sans Sandbox
Don’t have a sandbox available for analysis of a phishing attempt? Here are ways to analyze and better understand email scams.
Improving Defenses with Professional Development
Cybersecurity is no longer just the responsibility of the IT department; it’s a collective duty that involves every staff member, teacher, and student....
Mitigating a Successful Phish
MOREnet Security has seen an increase in the number of successful email phishes and to help districts mitigate, we’ve put together the following...
What Coaches Need to Know About Student Data Privacy
Coaches play a key role in protecting student privacy and having a list of guidelines available will help ensure they know what can...
The Power of Reporting: Strengthening Cyber Resilience Through Improving Report Rates
“I just delete” is a common refrain with users who receive phishing email attempts. While deleting a message is safer than interacting with...
Cybersecurity Vacation
July and August are typically known as the “summer vacation months” and unfortunately these months also see an increase in cyberattacks. Reduced staffing...
Reimagining Cyber Tabletop Exercises
Annual cybersecurity incident response tabletop exercises are best-practices and strongly encouraged. Whether this is the organization’s first tabletop or a regular occurrence, consider...
16 Billion Passwords Leaked: What to do
In June 2025, cybersecurity experts uncovered the largest password leak ever—over 16 billion unique passwords exposed and actively traded on the dark web. This massive breach, known as “RockYou2025,” is a clear sign that relying on passwords alone is no longer safe.
Too Much of a Good Thing – App Overload
Instruction, assessment platforms, reporting systems and parent engagement solutions are all delivered with applications. With so many resources available for use in the...
Reputational Harm from Cyber Incidents
“You don’t want to be on that list.” Cybercrime Magazine’s Paul John Spalding and Steve Morgan, Founder of Cybersecurity Ventures discussed how cyber...
Security Awareness Training is Essential in 2025
As cybersecurity threats evolve, educational institutions remain prime targets, with the human element often representing the weakest link in security. Security awareness training...
Google Resources On The Move!
Heads up teachers, techs and librarians! Two great resources from Google just got new homes and partnerships that are REALLY exciting! ...