Blog
REAL Program Contribution to MOREnet Shared Collection With OverDrive (Sora) to Help K-12 Schools
The Missouri State Library is pleased to announce it has contributed $30,000 to support the MOREnet Shared Digital Collection with OverDrive. The funding has...
Are You Snipe Hunting?
Threat hunting involves proactively seeking out cyber threats that may have slipped into your network. If a cyber crook slips past your defenses and finds...
Americans Worried About Online Data Security - But Maybe Not Enough
Safeguarding your personal data in a digital age is a problem for everyone. A poll by Ipsos on behalf of Google found that 84% of...
EBSCO Releasing a New Interface for Explora
During the week of July 18, 2022, EBSCO will release a new user experience for Explora, a search interface designed specifically for schools and public...
Don't Get Hooked!
Phishing awareness education can save money and reputation, protect assets and keep you from becoming front page news. Phishing is a social engineering technique used by...
Endpoint Protection: Do You Need It?
What is endpoint protection? Simply stated, it is the defenses that are enabled on end user devices. Some solutions are no cost. Some are low...
Threat Modeling
Identifying vulnerabilities and potential security threats while weighing the impact on an organization will assist with prioritizing how to address these weaknesses. This is threat modeling. Primarily...
Apps and Privacy
There's an app for everything! These apps bundle features together to make it more accessible to the mobile user. There are millions of apps, and...
Getting the Most Out of Cybersecurity Conferences
One of the biggest reasons security professionals attend conferences is to learn from experts in the field about new innovations. Networking and knowledge gathering are...
Verizon 2022 Data Breach Investigation Report
Verizon's annual Data Breach Investigation Report (DBIR) is out! Key takeaways indicate that ransomware, supply-chain threats and human error are prevalent threats. Now in its...
Is Ransomware Your Biggest Fear?
Ransomware is bad. Cyber crooks can seize your network, encrypt your files, render your devices useless and demand payment to reverse the damages. As destructive...
Malware Focus: Facestealer
Facestealer is malware hidden in apps that appear to look harmless. The intent is to steal credentials for popular social media sites. Researchers have discovered...
Job Offer Scams
As the fiscal year 2022 comes to a close there are many folks looking for new career opportunities, maybe adding some extra cash while taking...
How Do You Celebrate World Password Day?
#WorldPasswordDay is May 5, 2022. Every year on the first Thursday in May, we have an opportunity to promote better habits of password settings and security....
Ensure Readiness for the MSIP 6 Standard on Cybersecurity and Privacy
MOREnet is providing this information and guidance, in consultation with the Department of Elementary and Secondary Education (DESE), to assist districts and charters...
More About Phishing
There are so many angles of phishing. Getting phished is dangerous; it can rob you of personal information, reputation and money. There are different levels...
Spam: A Brief History
Annoying. That is the first word that comes to mind when thinking about spam. Prior to email, we referred to the clutter of advertising in...
Connected Kids
Online experiences can by positive and productive for kids. The world is an encyclopedia. Kids can learn about other geographic regions, get answers to questions...
MOREnet Video Blog: Submitting to Conferences
Learn how to get your sessions accepted at conferences.