Comment Period Open for AI Priorities

The U.S. Department of Education has proposed Artificial Intelligence priorities and definitions for use in discretionary grant programs or such programs that may be...

Computer screen with phishing hooks

Mitigating a Successful Phish

MOREnet Security has seen an increase in the number of successful email phishes and to help districts mitigate, we’ve put together the following...

Phone with social media information and sports equipment

What Coaches Need to Know About Student Data Privacy

Coaches play a key role in protecting student privacy and having a list of guidelines available will help ensure they know what can...

The Power of Reporting: Strengthening Cyber Resilience Through Improving Report Rates

“I just delete” is a common refrain with users who receive phishing email attempts.  While deleting a message is safer than interacting with...

Professional Development

Boost Your Skills This Fall: MOREnet's 2025 Training Lineup Is Almost Here!

As summer winds down, we're gearing up for an exciting fall! From September through December 2025, MOREnet will offer a fresh slate of...

Megan & Kate in the quantum computing lab.

A Peek Inside the World of Quantum Education

Discover how everyday materials, hands-on activities, and creative thinking are helping teachers bring quantum computing to life in K–12 classrooms.

Improving Defenses with Professional Development

Cybersecurity is no longer just the responsibility of the IT department; it’s a collective duty that involves every staff member, teacher, and student....

MOREnet logo with school building graphic

ISTE 2025 Recap

Just over 17,000 educators, students, technology professionals, librarians and others joined together in San Antonio June 28- July 2 to participate in the...

Cybersecurity Vacation

July and August are typically known as the “summer vacation months” and unfortunately these months also see an increase in cyberattacks.  Reduced staffing...

Five Time-Saving Features With Gemini and Gmail

Using the new Gemini feature in Gmail you can quickly become more efficient and more organized.  Here are five time-saving features you can...

People sitting at table

Reimagining Cyber Tabletop Exercises

Annual cybersecurity incident response tabletop exercises are best-practices and strongly encouraged. Whether this is the organization’s first tabletop or a regular occurrence, consider...

Secure password strategies graphic

16 Billion Passwords Leaked: What to do

In June 2025, cybersecurity experts uncovered the largest password leak ever—over 16 billion unique passwords exposed and actively traded on the dark web. This massive breach, known as “RockYou2025,” is a clear sign that relying on passwords alone is no longer safe.

Share with Researchers and STEM Faculty

On July 31, we will be hosting the fourth workshop geared toward primarily undergraduate institutions (PUIs) in the state to collaborate on National...

Meet VEX AIM, A New Addition to the MILL!

We're excited to announce that the VEX AIM robot has arrived in our makerspace! This compact, high-tech robot is an ideal addition for educators teaching grades 4–12 in computer science, robotics, technology, or STEM classes.

student surround with app icons

Too Much of a Good Thing – App Overload

Instruction, assessment platforms, reporting systems and parent engagement solutions are all delivered with applications. With so many resources available for use in the...