Blog

MFA Bypass Awareness
Multi-factor authentication is stronger than single-factor authentication, but not all MFA is phishing-resistant. One method of potential MFA compromise involves the use of...

SDPC Midwest Regional School District Training
Join us for the SDPC Midwest Regional School District Training, a focused and interactive event designed for school districts across Illinois, Tennessee and Missouri.

2013 - Pivotal Year in Student Data Privacy
The classroom fundamentally changed in 2013, going from data being held in the four walls to data being shared with third party vendors. This...

Multi-Factor Authentication: Some is Better than None
Cybersecurity controls continue to evolve, just as threats and threat actors continue to organize and adapt to the new controls. Passkey authentication and...
![]()
Password Managers and you
Passwords protect everything, from student records and payroll systems to library accounts and classroom tools. Yet most people reuse the same passwords across...
![]()
Grad Credit Opportunity at the 2025 MOREnet Annual Conference!
Are you ready to trade in the usual online professional development routine for innovative discovery and in-person networking? Mark your calendars because the...

Documentation is Key!
If you’ve taken advantage of our cybersecurity assessments, you know a common question we have for every area is – Is this documented? ...

Google Vids in the Classroom
Google Vids is a new tool in Google Workspace that makes it simple to create short videos using templates, voiceovers, and stock media.
![]()
The Twelfth Person – Leveraging Staff to Gain an Advantage Over Cyber Adversaries
Those who follow (or play) football know an engaged, active and loud home crowd provides a homefield advantage similar to an extra player,...

Trust but verify: defending against deep fakes
AI-driven impersonations and deepfake attacks are rapidly reshaping the cybersecurity threat landscape for global enterprises, with losses in the first quarter of 2025...

E-Rate Category Two (C2) Budget Cycle (New in FY26-27)
The new five-year cycle for the C2 budget has started and will run through funding year 2030. In June 2025, the FCC Wireline Competition...

Assessments, Threats, Compromises and MORE: MOREnet Cybersecurity Numbers!
For FY25, we visited 16 sites to conduct cybersecurity assessments! These are informal discussions on your best practices, and you will receive a scored assessment and suggestions for improvement.
![]()
A Guide to Cybersecurity Threat Statistics from National and International Reports
[Updated October 2025] Looking to create a data-informed information security program? A number of annual reports provide statistics by industry, type of threat,...

Attend Game Jam 2026
Are you interested in game development? Maybe you're just interested in learning about game development, meeting new people and taking advantage of the...

Five things you can do to mitigate the threat of ransomware attacks:
Ransomware is one of today’s most disruptive cyber threats, but its impact can be greatly reduced with the right defenses. By maintaining reliable backups, enforcing multi-factor authentication, keeping systems patched and updated, training users to recognize phishing attempts, and having a well-practiced incident response plan, organizations and individuals can significantly strengthen their resilience and recover quickly if an attack occurs.
