CSAM - Recognize and Report Phishing

October is Cybersecurity Awareness Month (CSAM) and is dedicated to raise awareness about the importance of cybersecurity. With the theme, 'Secure Our World',...

CSAM - Turn on Multifactor Authentication

October is Cybersecurity Awareness Month (CSAM) and is dedicated to raise awareness about the importance of cybersecurity. With the theme, 'Secure Our World',...

Regional Support Available

There is now an opportunity for small and medium sized school districts and libraries to have someone help with regular, onsite technology needs. Organizations...

CSAM-Use Strong Passwords & a Password Manager

October is Cybersecurity Awareness Month (CSAM) and is dedicated to raise awareness about the importance of cybersecurity. With the theme, 'Secure Our World',...

Cybersecurity Awareness Month-October 2024

Cybersecurity Awareness Month is dedicated to raise awareness about the importance of cybersecurity. Celebrated every October, this initiative will be celebrating it's 21st...

MOREnet logo with school building graphic

New Consortium Discounts

Google Workspace

Synetic is offering our members discounts on Google Workspace for Education licenses as well as products that range from device deployment to certified repairs...

MOREnet logo with school building graphic

Five EdTech Quality Indicators to Lighten the Load

Today, it's more important than ever for schools to choose high-quality educational technology products, but the evaluation process can be overwhelming. A new...

social media spotlight graphic

Automated Moving Target Defense (AMTD)

The static nature of most systems provide attackers with an advantage for finding vulnerabilities and launching attacks. To counter this threat, emerging technologies...

MOREnet logo with school building graphic

Join Us For A Conversation With Class AI

As a part of our ongoing education efforts about AI, we have been inviting specialists and vendors specific to education to share with...

Two-factor/multi-factor authentication graphic

IAM I Said

A good cybersecurity posture includes controlling access to assets. There are 2 approaches that are common and can be used together. It's important...

MOREnet logo with school building graphic

E-Rate Updates

The Universal Service Fund for Schools and Libraries, also known as the E-Rate Program is crucial in offsetting the cost of connectivity to...

MOREnet logo with school building graphic

Unlock Your Family's Story: Dive Deep With Heritage Quest!

Have you ever wondered about your ancestors? Where they came from, what their lives were like? If you're curious about your family history, then Heritage Quest is the perfect place to start your journey!

Cybersecurity graphic

Managing Change Management

Change is hard. Change means work. But sometimes, as in the case of IT, change is necessary. Change management assists in planning and...

Tools and resources small banner

Best Practices in Media Storage and Destruction

Most organizations collect, maintain and store massive amounts of sensitive and personal data. Understanding regulations surrounding this data is crucial to protecting it...

MOREnet logo with school building graphic

EBSCOhost Updating User Interface to Improve Accessibility and Updated Dashboard 

On August 1, EBSCO transitioned all MOREnet consortium accounts to a new user interface for EBSCOhost. This interface change only affects searching in EBSCOhost through search.ebscohost.com.

Cybersecurity graphic

NIST CSF Gets a Facelift!

Introducing the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) version 2.0. Nationally recognized as a cybersecurity framework for institutions to align with, the upgrades include some forward thinking improvements. The sets of controls are focused on risk management.

Virus cybersecurity banner

Bots-Friend or Foe?

What is a 'bot'? This refers to a software application that is programmed to perform specific tasks and can do this with or...

Remote work banner

Controlling the Keys

Your environment has valuables within the data you keep. Managing the access to this sensitive data is crucial to an organization's security. Core...

Cybersecurity graphic

Cybersecurity Needs YOU!

The cybersecurity industry has been suffering a critical shortage of talent for quite some time. It is reported that there is a...

Cyber crook graphic

Another Day, Another Data Breach

Yes indeed. I have been involved in multiple data compromises; Target, Home Depot, Retirement system, Equifax, Blue Cross/Blue Shield are ones I can...