Data privacy banner

Data Mapping and Inventory: What they are, How important are they, and How to do them.

Effectively managing your data is critical for compliance, risk reduction, and informed decision-making. Data mapping and inventory are foundational practices for any organization...

Cybersecurity and Accessibility

People with disabilities face an increased risk of being a victim of cybercrime due to the lack of tool...

Next-Gen Phishing Training

New AI-tuned phishing attempts are cause for re-evaluation of user phishing training. With AI chatbots able to assist in the generation of email...

A Thank You to Teachers — and a Tech-Savvy Self-Care Gift

You spend so much time curating experiences for others. This summer, let technology curate something just for you — whether it’s a relaxing book list, a fresh summer recipe lineup, inspiring podcasts, or outdoor adventures you’ve been craving.

Cyber Security blog banner

The Rise of AI Scams: What You Need to Know to Stay Safe

AI is making scams smarter, faster, and harder to spot. Criminals now use artificial intelligence to create ultra-realistic phishing emails, fake voices, and...

Unleash Limitless Learning: Upload Your Own Content to Read Along in Google Classroom!

Exciting news for educators! Google Workspace Updates has announced a fantastic new feature for Read Along that will revolutionize your literacy instruction. Now,...

Using AI for Note-Taking

AI Note-Takers are a great time saver and gaining popularity.  The ease of use and ability to produce an agenda and after-action items...

Help Desk person

Vishing 3.0

Cybersecurity threat trends continue to evolve, but seemingly outmoded threats vectors don’t always go away; sometimes, like in the case of vishing, they...

Tax Season AI-Powered Scams Are Targeting You—Here’s How to Stay Safe

As tax season ramps up in 2025, cybercriminals are leveraging cutting-edge technology to launch their most convincing and costly...

“Wi" Should I Log?

Guest wireless is a convenience to offer visitors.  What information should be logged for these connections? 

If someone used the...

Guide for Developing an Internal Vetting Process

Our data privacy team has created a handy guide to help your district develop a process for ensuring every resource with access to...

Google Workspace Updates

In a recent update posted on March 14, 2025, the Google Workspace team announced a new requirement for Google Workspace for Education administrators...

Ransomware graphic

Cheap (Cybersecurity) Wisdom

Russell Eubanks in a SANS Institute video “Improve Your Cyber Security Culture” offers the following advice learned from one of his own mentors:...

MOREnet logo with school building graphic

Students ask "What is bias in AI"?

I was recently at the Educators Rising conference at Westminster College in Fulton. This conference is for high school students who are...

Graphic showing papers on a desktop

E-Rate Filing Window Deadline is Here

The E-Rate form 471 filing period closes March 26, which means the deadline to inform MOREnet of bandwidth increases to be funded in...