Blog
Cheap (Cybersecurity) Wisdom
Russell Eubanks in a SANS Institute video “Improve Your Cyber Security Culture” offers the following advice learned from one of his own mentors:...
The Reality of IoT Security : Guests on Your Network
IoT devices and other vendor appliances, while convenient, are often security weak points. They frequently ship with outdated firmware, weak passwords, and even...
Don’t Just “Google it”
“Google” is now a term embedded in our language and s iroutinely used. As with all routines, we may become complacent on how we...
Defining "Reasonable Cybersecurity"
State laws, legal cases, grant requirements, cyber insurance, and those impacted by data exposure all may refer to the term “reasonable cybersecurity” when...
A Stitch in Time: Why Patching Should Be on Your Schedule.
In the ever-evolving landscape of cybersecurity, vigilance is paramount. While firewalls and intrusion detection systems form a strong first line of defense, they...
Higher Education Affordable and Open Educational Resources Conference
The Missouri Affordable and Open Educational Resources Conference (A&OER) planning committee invites you to the 6th annual virtual conference! The MO A&OER Conference...
Beware of the 'ishing'
Social Engineering is the use of deception in order to manipulate the victim into performing an action for fraudulent purposes. The bad actor...
Google Workspace Updates
At MOREnet, we are committed to keeping our members informed about the latest developments that may impact their technology experience. Recently, we received...
CIS Critical Controls Version 8.1
The Center for Internet Security (CIS) has long been respected for it's framework of critical security controls. Released in 2008, it's purpose was...
Old Tool, New Tricks (Tinkercad update)
When we teach the art and science of 3D printing, our favorite "go to" tool for beginner design is Tinkercad. This stable,...
Data Privacy Day - January 28, 2025: You Have the Power to Take Charge of Your Data
As more data is stored in the cloud or transferred to third parties, how can...
Incident Reporting: Your First Line of Defense
Organizations use layered security to prevent falling victim to a cybersecurity incident. The 3 main elements of layered security require administrative, physical and...
Ring in the New Year with a Cybersecurity Makeover
A new year brings new opportunities. What a great time to review your cybersecurity practices! Evaluate every aspect of your digital life. Check...
Ring in the New Semester with Opportunities for Your Most Tech-Savvy Students: Goal Ideas for Educators
As the confetti settles and the year unfolds, it's time to set our sights on making 2025 a year of impactful learning in our classrooms.
Caught in the Web: Common Cyber Crimes
Cyber crime is a broad term that can encompass a wide variety of malicious activity. These attacks can be aimed at networks, businesses...
Community Anchor Resources for K-12
Because MOREnet is a member of the Internet2 community, K-12 members have access to the Internet2 Community Anchor Program (CAP) resources. Some of...
Community Anchor Resources for Libraries
The Toward Gigabit Libraries toolkit is a powerful, FREE tool to help libraries learn about and improve their current broadband infrastructure and internal information technology (IT) environment.
Salt Typhoon Cyber Attack
The Salt Typhoon cyber attack, conducted by bad actors in China, targeted telecommunication organizations. Major telecom companies were hacked, including AT&T, Verizon, T-Mobile...
Missouri State University Offers a Great Opportunity for Rural Educators
The CODERS (Coders Opportunity Development and Education in Rural Schools) initiative at Missouri State University, Springfield, Missouri, funded by the U.S. Department of...