Blog
The Cost of a Data Breach
There are many facets of cyber crimes. Some attacks are meant to disrupt normal business activity, while others may aim to steal or encrypt data in an effort...
MOREnet Video Blog: Skill Struck Computer Science Curriculum
Bob Martin talks with Jessica Kosinski of Skill Struck about the service Skill Struck provides and how it can help educators teach computer science.
More Cyberbullying: Doxing
Using social media can be entertaining and educational, connecting us with others. These platforms allow users to share photos, send messages, game with friend, posts...
2022 H1 Global Threat Analysis Report
The H1 2022 Global Threat Analysis Report provides detailed insights into network and application attack activity.
A Note From Our Chairman
I have been involved with the MOREnet Consortium for over twenty years, with about half of that time serving on the Council in some capacity....
Back to School
Summer fun is over, and kids are heading back to the classrooms. Pens, papers and electronic devices of all sorts will be accompanying them. They are...
Getting to Know Education Technology: The micro:bit
Most education technology can be intimidating to learn, and that is putting it gently. Many of these learning tools appear to require a degree in...
Private Browsing
What is private browsing? Your browser (Chrome, Firefox, Edge, etc.) has a setting that allows you to set your web browser in a way that...
Adult Cyberbullying
Cyberbullying is bullying that takes place in a digital environment. The bully will use social media and text messaging to harass their victim. Cyberbullying is...
Ancestor Search With HeritageQuest
Did you know your MORenet membership gives you access to Ancestry's HeritageQuest? Heritage Quest is an essential collection of genealogical and historical sources–local and family histories...
Cybersecurity Focus: Physical Security
The physical security of your facility, network, data and personnel is essential. Failure to safeguard any of these components can lead to a breakdown in...
Can a Wireless Keyboard Be Hacked?
Wireless keyboards connect to a device via Bluetooth. Most require a USB dongle in order for the keyboard to be recognized by the device. Early...
MOREnet Video Blog: Computer Science Teachers Association Conference
Bob Martin and Joey Bryant recap the Computer Science Teachers Association Conference.
New Interface and Improved Content: Explora Consumer Health Complete
Last month, EBSCO released several enhancements to its Consumer Health Complete database. This resource is part of your MOREnet Membership Service Package.
REAL Program Contribution to MOREnet Shared Collection With OverDrive (Sora) to Help K-12 Schools
The Missouri State Library is pleased to announce it has contributed $30,000 to support the MOREnet Shared Digital Collection with OverDrive. The funding has...