Cybersecurity graphic

Managing Change Management

Change is hard. Change means work. But sometimes, as in the case of IT, change is necessary. Change management assists in planning and...

Tools and resources small banner

Best Practices in Media Storage and Destruction

Most organizations collect, maintain and store massive amounts of sensitive and personal data. Understanding regulations surrounding this data is crucial to protecting it...

MOREnet logo with school building graphic

EBSCOhost Updating User Interface to Improve Accessibility and Updated Dashboard 

On August 1, EBSCO transitioned all MOREnet consortium accounts to a new user interface for EBSCOhost. This interface change only affects searching in EBSCOhost through search.ebscohost.com.

Cybersecurity graphic

NIST CSF Gets a Facelift!

Introducing the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) version 2.0. Nationally recognized as a cybersecurity framework for institutions to align with, the upgrades include some forward thinking improvements. The sets of controls are focused on risk management.

Virus cybersecurity banner

Bots-Friend or Foe?

What is a 'bot'? This refers to a software application that is programmed to perform specific tasks and can do this with or...

Remote work banner

Controlling the Keys

Your environment has valuables within the data you keep. Managing the access to this sensitive data is crucial to an organization's security. Core...

Cybersecurity graphic

Cybersecurity Needs YOU!

The cybersecurity industry has been suffering a critical shortage of talent for quite some time. It is reported that there is a...

Cyber crook graphic

Another Day, Another Data Breach

Yes indeed. I have been involved in multiple data compromises; Target, Home Depot, Retirement system, Equifax, Blue Cross/Blue Shield are ones I can...

Two-factor/multi-factor authentication graphic

Comparing MFA Methods: Which One Fits Your Security Needs?

Multi-factor and 2 factor authentication methods were introduced as an additional security measure to protect a user's login. A user will typically...

Vacation Dreams to Nightmare? Stay Safe!

Online booking platforms have become popular for travelers seeking vacation deals for accommodations, flights and car rentals. It's important to recognize that this...

Cybersecurity banner

Building Cyber Resilience

Cyber threats are an everyday menace for organizations. It requires significant investments and resources to safeguard the environment; protecting assets, data and people....

Camera-On Meetings are the New Professional Norm

For the last fifteen years, I have taught group fitness classes as a hobby at a local fitness studio.  Before the pandemic, if...

MOREnet logo with school building graphic

Update to EBSCO Explora

In the interest of creating profiles that are age appropriate and meet the needs of specific levels of learners, Academic Search Elite has been removed from the Explora – High School interface. Academic Search Elite is still available to search through the EBSCO host A – Z database index at search.ebscohost.com and through the new Explora – Academic search.

MOREnet logo with school building graphic

New EBSCO UI Coming Aug. 1

On August 1 EBSCO is transitioning all accounts that are a part of the MOREnet Consortium to a new user interface for EBSCOhost.

Kids online

The Human Firewall

Cybersecurity fortification goes beyond the hardware and tools. Building a positive, defensive culture within the organization is a vital part of an overall...

Ransomware graphic

Encrypting Files for Evil

Data encryption is important in helping protect confidentiality and integrity of the data. This form of cryptography will take plaintext and transform it...

Cybersecurity blog - two-factor authentication

Oops! Your Passwords Are Showing

Passwords are important to keep accounts private and secure. Keep in mind that you should follow security best practices when using passwords.

Behind the Square

Quick Response (QR) codes have become common place in advertising and communication. Once requiring a special QR code reader, these codes can easily...

Membership banner - K-12

Choosing Your Cyber Attack Recovery Site

Having an area where recovery operations can function can sometimes be an important element in recuperation from a cybersecurity incident. There are 3...

Ethical Use of Personal Attributes in AI Technology

Artificial Intelligence collects data from multiple resources in order to create new content. Some of the data may be collected without informed consent....