MOREnet logo with school building graphic

Cybersecurity Focus: Physical Security

The physical security of your facility, network, data and personnel is essential. Failure to safeguard any of these components can lead to a breakdown in...

Cyber crook graphic

Can a Wireless Keyboard Be Hacked?

Wireless keyboards connect to a device via Bluetooth. Most require a USB dongle in order for the keyboard to be recognized by the device. Early...

MOREnet Video Blog graphic/logo

MOREnet Video Blog: Computer Science Teachers Association Conference

Bob Martin and Joey Bryant recap the Computer Science Teachers Association Conference.

search.more.net/Online Resources banner

New Interface and Improved Content: Explora Consumer Health Complete

Last month, EBSCO released several enhancements to its Consumer Health Complete database. This resource is part of your MOREnet Membership Service Package.

Consortium Discount banner - Overdrive

REAL Program Contribution to MOREnet Shared Collection With OverDrive (Sora) to Help K-12 Schools

The Missouri State Library is pleased to announce it has contributed $30,000 to support the MOREnet Shared Digital Collection with OverDrive. The funding has...

Cyber crime graphic

Are You Snipe Hunting?

Threat hunting involves proactively seeking out cyber threats that may have slipped into your network. If a cyber crook slips past your defenses and finds...

MOREnet Video Blog banner/logo

MOREnet Video Blog: CYBER.org's Chuck Gardner

Bob Martin talks with CYBER.org's Chuck Gardner.

MOREnet logo with school building graphic

Americans Worried About Online Data Security - But Maybe Not Enough

Safeguarding your personal data in a digital age is a problem for everyone. A poll by Ipsos on behalf of Google found that 84% of...

Explora Interface changes coming soon graphic

EBSCO Releasing a New Interface for Explora

During the week of July 18, 2022, EBSCO will release a new user experience for Explora, a search interface designed specifically for schools and public...

Phishing graphic

Don't Get Hooked!

Phishing awareness education can save money and reputation, protect assets and keep you from becoming front page news. Phishing is a social engineering technique used by...

MOREnet logo with school building graphic

Endpoint Protection: Do You Need It?

What is endpoint protection? Simply stated, it is the defenses that are enabled on end user devices. Some solutions are no cost. Some are low...

Cybersecurity Assessment small banner

Threat Modeling

Identifying vulnerabilities and potential security threats while weighing the impact on an organization will assist with prioritizing how to address these weaknesses. This is threat modeling. Primarily...

Mobile security graphic

Apps and Privacy

There's an app for everything! These apps bundle features together to make it more accessible to the mobile user. There are millions of apps, and...

MOREnet Video Blog banner/logo

MOREnet Video Blog: Starting an Esports Team

Tony Gragnani and Bob Martin discuss esports.

Classroom small banner - man at whiteboard graphic

Getting the Most Out of Cybersecurity Conferences

One of the biggest reasons security professionals attend conferences is to learn from experts in the field about new innovations. Networking and knowledge gathering are...

Employee education small banner

Verizon 2022 Data Breach Investigation Report

Verizon's annual Data Breach Investigation Report (DBIR) is out! Key takeaways indicate that ransomware, supply-chain threats and human error are prevalent threats. Now in its...

Ransomware graphic

Is Ransomware Your Biggest Fear?

Ransomware is bad. Cyber crooks can seize your network, encrypt your files, render your devices useless and demand payment to reverse the damages. As destructive...

Permission Click small banner

Malware Focus: Facestealer

Facestealer is malware hidden in apps that appear to look harmless. The intent is to steal credentials for popular social media sites. Researchers have discovered...

Work from home graphic

Job Offer Scams

As the fiscal year 2022 comes to a close there are many folks looking for new career opportunities, maybe adding some extra cash while taking...

MOREnet Video Blog banner/logo

MOREnet Video Blog: Getting Started With Computer Science

Roundtable discussion with Bob Martin, Trista Benedict, Ching-Wen Chang and Annice McLean.