Blog
Cyber Threats to Educational Institutions
Technology is heavily relied on in school settings. Internet connectivity, email, collaboration tools and daily operations all need technology to function. The addition of high tech devices lends itself to productivity but also comes with the potential of cyber threats. What types of threats are targeting our schools, staff and students?
Key Resources for Understanding AI (in Education)
Hello friends! Alas, another post about Artificial Intelligence! But in this post, I want to share some of the most helpful scholarly sources...
Can We Trust AI?
Artificial Intelligence (AI) is here. The barn door has been opened and the horse is out of the stable. Adopters are discovering the...
Please Do Not Throw Sausage Pizza Away
Open Systems Interconnection Model (OSI) is a framework used to describe the layers and functions of a networking system. First introduced in 1983,...
100% of MOREnet Members Now Fiber Connected - Rural Fiber Comes to Ballard R-II
Ballard R-II, a rural school district in western Missouri, celebrated a monumental leap forward as fiber Internet connectivity arrived in June, connecting its...
Deepfaking: How Bad Actors Are Using It
Deepfakes can be used to persuade, spread disinformation or just be fun. Bad actors are finding ways to use artificial intelligence (AI)...
Summer is the perfect time to get the most out of your MOREnet Membership Service Package benefits.
Schedule an assessment
Both Cybersecurity Assessments and Network Assessments are included with your Full Membership Service Package. With both assessments,...
Are You Watching The Watchers?
Managed Service Providers (MSP) are a critical component for managing networks for many organizations. Due to lack of personnel or expertise, institutions are...
AI TRiSM
With the emergence of Artificial Intelligence (AI) the landscape of trust and security needs to be considered. Thus, the development of, yet another...
Verizon 2023 Data Breach Investigation Report
Verizon's annual Data Breach Investigation Report (DBIR) is out! Key takeaways indicate that social engineering attacks using (BEC) Business Email Compromise have almost...
What is a Vulnerability?
A vulnerability, in information technology (IT), is a flaw in code or design that creates a potential point of security compromise for an...
It's NOT Security Awareness Training
Fingernails on a chalk board. That is what this term sounds like to me. I believe awareness is a result of education. Training...
Is Your Connected Home Telling Your Secrets?
As the Internet of Things (IoT) continues to evolve, users are expanding their home networks to include these new devices. Most of these...
Infobase Consortium Discount
Infobase creates and curates reliable educational resources and digital tools for educators, librarians and learners across the globe. Infobase delivers inspirational content seamlessly...
Secure Password Strategies
The foundation to secure passwords strategies is having a strong password. What makes a strong password? Longer=stronger. Even with two-factor/multi-factor (2FA/MFA) implementations, getting...
ChatGPT and a Dozen (or so) things you can do with it.
Obviously ChatGPT has been taking the media by storm and we aren't quite sure what to do with it. Do we use it...
Access is a Privilege, Not a Right
The misuse of privileged access is a dangerous security threat. It can lead to extensive damages within an organization. Everyone on your network...
New and Upgraded Online Research Resources Databases for MOREnet Consortium
We are excited to share with you that we have negotiated added value to the Online Resources included with your MOREnet Membership Service Package! Beginning in the new fiscal year, July 1, 2023, PrepSTEP databases will now be part of your tool kit, and two existing resources will now include additional features.
Cybercrime-Trends and Targets
Every day is marred with cyber attacks. Whether it is a data breach, DDoS attack, credential theft or ransomware, these crooks are after...
Ethical Hacking?
When we usually think of hacking, we think of someone sitting in a dark room with a hoodie on, furiously typing away as...