Two-factor/multi-factor authentication graphic

2FA, MFA, Tokens and Codes

Having multiple forms of authentication can help to keep your accounts safe. This extra layer of security, in addition to having a strong...

MOREnet logo with school building graphic

Navigating Code.org and Its Resources

Code.org has been leading the charge for computer science education in schools for several years.  Code.org has partnered with industry leaders...

The Importance of Student Data Privacy - Who's Viewing Your Data?

Do you know all the applications your district is using and who has access to this data? When do districts need a data privacy agreement and why is this important?

Phishing graphic

Hook, Line and Sinker. Opening the Phishing Box.

Phishing-Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware....

Social media graphic

Choose How You Cruise

Web browsers are fundamental tools for navigating the Internet for information and resources. It's important to understand the security components of the browser...

Virus cybersecurity banner

Tech Support Scams

You are browsing websites, checking out the headlines, shopping or catching up on social media. Suddenly you are presented with a screen that...

Ransomware graphic

Honor Among Thieves

Is there such a thing? This phrase suggests that crooks trust each other. They will not steal from each other. When it comes...

Time to Spring Clean - Digitally

Block some time to review what you have saved on your computer and in the cloud; cleaning it will improve efficiency as well as potentially protect your data.

Pi Hole DNS ad blaocking

How To Configure a Raspberry Pi as an Ad-Blocker

In this in-depth Pi Day project spotlight, I’ll walk you through the steps to turn a Raspberry Pi into an ad-blocking DNS server...

Artificial Intelligence and the Criminal Mind

The hype of artificial intelligence (AI) has caused excitement and fear. Various AI tools can be used to create audio, video, written content,...

Digital Crook

I Always Feel Like Somebody's Watching Me

That catchy tune by Rockwell is applicable in today's society. Social media and other online presences allow for Open Source Intelligence (OSINT)...

AI Bloopers

Can Artificial Intelligence results be wrong? Unfortunately machine learning and algorithms are lacking some human interventions to provide accurate and factual data. There...

MOREnet logo with school building graphic

Conversations with AI. Great Google tool for learning to be descriptive

One of the best ways to get better results from Artificial Intelligence tools is to be very descriptive with your conversations (prompts). ...

Cyber crook graphic

Why? Because I Said So!

Security is hard, right? So many restrictions! Passwords, MFA, content filtering, app restrictions, screen lock outs, etc. Why do I need to have...

lady on a laptop graphic

Will You Be Mine?

Valentine's Day is a time for romance. Many will celebrate with exquisite dinners and gifts. Others prefer a simpler way to express their...

Threat Management

Cyber Sentry: Tracing the Evolution of Cyber Defenses

The term 'cybersecurity' has become a part of our everyday vernacular. Cybersecurity refers to frameworks, tools and practices to keep technology systems and...

Cybersecurity graphic

How to Meet and Maintain Your Cyber Risk Insurance Requirements

Cyber attacks can be detrimental to an organization if not proactively addressed. Attacks can be disruptive and costly. There is a chance of...

Missouri High School Cybersecurity Challenge 2024

Missouri Students Practice Computer Science Skills in Annual High School Cybersecurity Challenge

The Missouri High School Cybersecurity Challenge is an annual event hosted by MOREnet that provides high school students the opportunity to explore...

Data Privacy Date - January 28!

This year’s theme is “Take Control of Your Data”!  One of the areas that is overlooked is deleting data no longer required to...

Membership banner - K-12

Cybersecurity Frameworks-One Size Fits All?

A cybersecurity framework can assist with cybersecurity risk management by establishing a set of guidelines, standards and best practices. The purpose of describing...