This site is no longer maintained. Please see MGLink.org for updated content.
“It’s the processes and procedures, working with all the other customers. We have to get them to understand the importance of planning. One way is to do tabletop exercises to practice to see what we would do in the event of an event,” said Mark Gabehart (Round Rock ISD). As Mark’s voice filled the respectful silence as he spoke, his turn of phrase caught my ear. Whatever did he mean by “tabletop exercises?”
In this blog entry, we’ll discuss the value of tabletop exercises for cybersecurity, disaster recovery, and business continuity. You will also find a complete game that you as a technology leader can use right away.
Like many, if not all of you, I found myself spending way too much time on filtering issues. Block this, unblock that, getting teachers by-pass rights, etc. I finally just got fed up with all the time it was requiring. When I started looking at trends I realized we were using the filter as a student management tool and not for its intended purpose. Let me be very clear, we are still filtering and complying with CIPA and other mandates.
What we are NOT doing any longer, is blocking all the multitudes of other sites that might have inappropriate material. There are many sites, YouTube comes to mind, that have a lot of great educational material but also have content that is inappropriate at school.
If I block YouTube, then many of the school safe sites, like the browser Kidzui, Gaggle.net, and many others that use videos from YouTube, will not work. So, I did something drastic. I deleted the entire custom “blocked” sites in the filter. These are the sites that we add over time to the blocked library. There were literally thousands. The custom block library had become unmanageable. It was a total senseless mess....
The bottom line is that we are no longer using the filter as a student management device. We still block clearly inappropriate sites that have absolutely no educational value. The rest is up to proper monitoring and when that fails, treating the issue as a discipline issue, which it is. We have put the responsibility back on the teacher in the lab to monitor students effectively. Source: Texas Technology Director
Turn On Two-Factor Authentication Tutorials
Personal Tip: Try Firefox Quantum with the Multi-Account Container, which allows you to group your browser cookies. This prevents one site from spying on you while you are looking at another (Facebook does this, as do many other sites). Try privacy add-ons, too.
Need to encrypt using public/private key encryption tools that are compatible with PGP/GPG? Consider GoAnywhere's Open PGP Studio for Windows, Mac, or GNU/Linux computers. GoAnywhere also offers a Secure File Transfer Protocol (FTP) solution.
"Virtual Private Networks provide an important element of privacy protection for users," Electronic Frontiers Association says. . .VPNs [are] one of the most effective tools for protecting privacy when using the Internet, due to the degree of anonymity they provide when accessing online services.
Opera browser has a built-in VPN that works well
DotVPN Chrome add-on works with your Chrome browser
Private Internet Access (PIA) (approx <$40 annually or $6.95 per month)
All VPNs above have mobile versions
7zip for Windows - This is a zip/7zip compression program that combines multiple files into one. Works great with a wide variety of files. Think of it as putting a folder of files into ONE file that is compressed for space and encrypted for security.
Keka Zip for Macs - This is the same thing as 7zip but for Mac computers.
Paranoia's Secure Space Encryptor (SSE) - Here is (what I think) is the best cross-platform encryption tool available. It works on the most platforms (e.g. Android, Mac, Windows). One of the features is that it can take a folder of files and encrypt them all into ONE file.
To facilitate decryption, open the Paranoia Text Encryption Online tool (via the web browser on your device, including smartphones) and paste in the text that appears below. Use the password - kQgWbQhc58wc - and send it to "mguhlin@tcea.org" via email. Obviously, this password would not be shared on a web page for anyone to access. It is shared here for demonstration purposes.
==Begin Encrypted Text Below (only copy encrypted content, not anything with == in front of it)
fIqoBFlGIJibGhbYnHhdKkrpjQs2a]DKvDuxGOIEosjfgk)bHvqKB693PuPdSGCbtT9rS]KB3PFNo0MVKm95B)yF06rj)]KrLJnPfpogU1yIT]DgCzbsw8PlqxSZ]ndqcefwocfLOX9)q3tDSWtNg9WPw85yMyI47H6t8y1)LESw3P3roKKx3)3QscDPifOOTPhwOzmMkvl5ZgzvkzIbX8gQrcXrXJR2O9r5axA63]L6Ja9L6UeVt1Q810oZlDkLD2RIu0RS6ilV8aIR)TIrs66MxYYOqgh2HQ1UgSuI33EMuV8jGENDYxjxGA)5K]g6YJekzBGr5iWGYymUTP)UQvRIU2TSfmkIYzpAIozEMcBsrZ9KBzfchP1LdkB7oOH6ZSnFIrDskFwgx31AjCGeOEjy8bhkvF9gx2UkCDr28rMfR6DIPUGX7vjZY5fuDR])blioTUqE1I66ltMkJ9lMHTjntNQhu1rED232iV727yBPuNHJWu1qfNDgQLNsxngWIuxu7Y2Wt3jH1ql3IpePG3w1sjicGwmfzsj]1lW)1MoXzkFuLI8fC5556Q8FSG6R44XS)Sy5z5Xq412u6XPPU4M3HanQrIb1SGGTcjf1QDStWTREzQQKeT9G5blz499O8YxWqq9Q4Q1poQYFqDXYBPZjV9i93AiP9W4JStyShTU)ezjqBWpQmEy4UVCPD7yR]QLBcSUZT7OshQ)Ow6lxZm)lU6A!
==End Encrypted Text Below (only copy encrypted content above)
To encrypt text, type your own message in the Paranoia Text Encryption Online tool and then send the encrypted text to "mguhlin@tcea.org" with subject line of "Encrypted Text." Use the password - T5ecaJiMepSU - to encrypt. Or, if you prefer, use a different password.
You can easily encrypt emails in G Suites EDU using a tool like SecureGmail. Here are a few more alternatives:
Virtru Email Encryption - Encrypt email messages you send to anyone (e.g. Gmail, Yahoo, etc.) (Watch video)
SecureGmail - Encrypt any gmail messages you send to others with gmail (attachments aren't encrypted). (Watch video)
Mailvelope - Another way to encrypt email using public/private key encryption (Watch video)
Paranoia Text Encryptor (PTE) - Call someone, give them the password then email the encrypted text (Watch video)
Need an enterprise level solution? Check with your anti-virus vendor. You may also investigate others.
Get Secure Space Encryption (SSE) tool, 7zip (Windows) or Keka (Mac). Set it up on your computer.
Find a file or folder (avoid folders with hundreds of files for this activity...a folder with 2-5 files is sufficient).
Encrypt the file/folder with your preferred tool using AES-256 encryption protocol. Use this password: M9pXYbENF5mp
Send the file as an attachment to Miguel at "mguhlin@tcea.org" with Subject: Encrypted File
Save the file available online and decrypt it. A copy of the encrypted file is available in ZIP (*.zip) or SSE (*.enc) encrypted format.
Open the files successfully on your device.
Make sure to shred/wipe the ORIGINAL decrypted files/folder(s) when "at rest." Of course, first check that your decryption password works.
Dragging items to the Trash/Recycle Bin is insufficient since they can be recovered using a free tool like Recuva on Windows or your hard drive accessed on a GNU/Linux system then files recovered.
File Shredder (Windows)
Bleachbit (Windows/GNU-Linux)
Try FileLock.org if you need a browser-based solution.
This is a question you will get. Make sure you keep your response simple and make it a requirement of dealing with sensitive data.
Avoid embarrassment and high-cost of identity theft protection for students and staff. Texas Safe Harbor law protects organization that encrypt data should that data be lost or stolen.
Avoid sending decrypted confidential information via email or as email attachments. Phishing attacks can compromise users' accounts and spread to all quickly via email groups (a.k.a. distribution lists). Decrypted data on compromised accounts can be a treasure trove and lead to costly issues. Encrypted email attachments are no big deal on a stolen smartphone, tablet or laptop. Decrypted email attachments or files on stolen devices puts the district at risk for liability and lawsuits.
Avoid saving decrypted files to portable devices (e.g. laptops, tablets) and/or storage media (e.g. USB flash drives, pendrives, sticks, hard drives).
Always encrypt sensitive data before sending it to a third party solution provider. Negotiate up front, over the phone how you will encrypt data and come up with a solid password to use. If data is transferred from a server, encrypt it FIRST before placing it on the server, then use Secure FTP to transfer it. An alternate approach is to grant the 3rd party solution provider Virtual Private Network (VPN) access to a specific device. This may be easier since you can setup a network share, a mapped drive, to make it simpler to create and share files quickly. Again, it is better to encrypt than to have decrypted files at rest on an intranet server.
NEVER place decrypted sensitive files online on an internet server and/or in cloud storage.
Seventy percent of hiring managers say they’ve decided not to hire an applicant because of information they have found online, according to a survey commissioned by Microsoft of 1,200 human relations managers and consumers. While most of those surveyed stated they research candidates online and think they are justified in doing so, only seven percent of consumers believed that recruiters check out potential candidates online when making hiring decisions.
Over one-half of managers surveyed agreed that data on lifestyle, inappropriate written text and inappropriate photos were types of information that could result in rejecting a candidate. An overview of the findings from the survey can be accessed at http://www.microsoft.com/privacy/dpd/research.aspx.
Positive online reputations matter.
Create your digital footprint
Decide how you want to "brand" yourself or your program
Create a standard username and picture that will represent your best version of yourself online
Create online accounts on popular social media sites (e.g. Blogger, Twitter, Facebook, Instagram, Snapchat)
Put your social media contact information on your website, in your email signature, and print documents
Make collection of awesome resources relevant to your work easy. Use a content curation tool like GetPocket.com, Nuzzle or Flipboard that work on web-friendly and mobile devices
Create a distribution channel. Make sharing of awesome resources easy (e.g. you share once and it goes everywhere) with IFTTT.com
Connect and Share often. Silence is absence. Put positive text, audio, video and content online about you, your program via your distribution channels
Own your space. If you don't step into your space, others will. Some will do it because it's their space too (e.g. similar name or brand). Others will do it to be malicious (e.g. defame your character, slander your good name).
Jane Hart put together her Top Tools for Learning list into a framework. (via tweet)
This is your chance to develop your own framework! Use the Google Draw document to create your own (here's the PPTx version).
SafeSchools.net offers K-12 school districts the ability to assign cyberbullying courses and more to staff. Staff have to actually complete a battery of online materials. The SafeSchool system tracks completion and allows for greater accountability.
Need ideas on how to celebrate Digital Citizenship Week? Check out these activities and resources that are sure to help you.
Digital Citizenship Week (October 16 – 22) is the perfect time for you and your students to reflect on the role technology plays in your lives. It’s an opportunity to stress the importance of positive online habits, to learn about digital safety and responsibility, and to encourage acts of kindness.
Often, it's one thing to develop policy, quite another to implement it in a way that makes sense. How can we, as leaders in a learning organization, model responsible use of technology with students and staff?
Over the next 30-40 minutes, you will explore this question and learn how the school district plans to introduce students and staff to digital citizenship, cybersafety and responsible use.
Being a good digital citizen is more than knowing your way around the web. It's about connecting and collaborating in ways you didn't even know were possible.
Our K–12 digital citizenship program includes comprehensive learning resources for students, teachers, and family members and 65 grade-differentiated lesson plans.
National Cyber Security Awareness Month (NCSAM) – observed every October – was created as a collaborative effort between government and industry (the U.S. Department of Homeland Security and the National Cyber Security Alliance) to ensure every American has the resources they need to stay safer and more secure online. 2017 marks the 14th year of National Cyber Security Awareness Month.
This binder is an attempt to collect and organize Digital Citizenship resources by age (grade level). Often when we think of Digital Citizenship, we only think about the safety aspects of it but being a digital citizen is much more than just being safe. The nine elements of Digital Citizenship as outlined in the book Digital Citizenship in Schools by Mike Ribble and Gerald Bailey are: Digital Etiquette; Digital Communication; Digital Literacy; Digital Access; Digital Commerce; Digital Law; Digital Rights & Responsibilities; Digital Health & Wellness; and, Digital Security (self-protection).
http://www.livebinders.com/play/play/34991#
WoodWardTrac shares a variety of resources and links to assist you in learning about digital citizenship. An annotated bibliography is also included as well as a list of blogs and Twitters you may be interested in following.
http://digitalcitizenship21.wikispaces.com/
This link takes you to pins that have been labeled with 'Digital Citizenship'. You may also be interested in clicking on Boards to reduce some of the clutter and redundancy.
http://pinterest.com/search/?q=digital+citizenship
Take part in the conversation that is going on via Twitter. You can search for the hashtag #DigCit to find information and resources. You can also search for "Digital Citizenship" (in quotes) to find resources.
This documents provides information about cyberbullying and cyberthreats for educators and other professionals who focus on youth safety and well-being and sets forth recommendations for a comprehensive school and community-based approach to address these concerns.
http://www.wcs.k12.va.us/users/honaker/cyberbullying-for-teachers.pdf
This toolkit was developed by Common Sense Media
https://www.commonsensemedia.org/educators/cyberbullying-toolkit
Howcast shares their video on using proper netiquette while online. Though this may include some items you may not cover in netiquette, it has good information.
[Time: 2:39]
http://www.youtube.com/watch?v=6dRoclqDJh0
This fun video was created using the SockPuppets app. Since the app doesn't create long videos, short 30 second clips were pieced together to explain the nine elements of being a digital citizen.
[Time: 8:56]
http://www.youtube.com/watch?v=zD_CANwFASU
This video shares how easy it is to find out information about a student if they aren't careful about what they post. Even though the video is a little pixelated, it is a great tool to emphasize the need to think before you post.
[Time: 5:01]
http://www.youtube.com/watch?v=aMJ4u3zfmoo
This short video shares how damaging it can be when someone misuses your information and how it can hurt others.
[Time: 1:50]
http://www.youtube.com/watch?v=SQP3s1HmrAo
This tragic story of Kacie Woody is worth telling so that others may avoid falling for the trap that ensnared her. She was an honor studet, her dad was a police officer, and still some bad decisions were made that ended fatally.
http://www.youtube.com/watch?v=-mEirio3xIg
Known for providing quality research, the Pew Center has a lot of information related to teens and their use of the Internet. They make it easy to find specific topics, demographics, and/or technologies.
http://pewinternet.org/Topics.aspx
This study, by Marsha Roth, examined Elementary students’ perceptions of how bullying issues are addressed in their classroom. Relevant data were obtained from 3rd, 4th and 5th grade Elementary school students and from 12 Elementary school teachers. The goal of the study is to determine the correlation between teachers and students perceptions of bullying in the classroom. SS Elementary teachers lack the information in knowing how their students perceive bullying in the classroom.
Though it may be easy to feel like you are sinking when you start reading research, jump to the section on Findings - page 74 of this document. This is where the rubber meets the road for our conversation. Interesting findings though maybe not surprising. This information can help inform you when implementing your curriculum.
In this article, June Ahn, reviews emerging research surrounding youth's engagement with social networking sites. While this article is very academic, it does offer good insight and data.
http://onlinelibrary.wiley.com/doi/10.1002/asi.21540/pdf
TeachersFirst is a collection of resources and lessons for teachers. Suggestions for safe Web 2.0 sites as well as online safety resources are given.
http://www.teachersfirst.com/spectopics/safety.cfm
Designed for grades 3 through 8, each scavenger hunt provide students a list of questions they have to answer as they explore various websites.
http://usa-sos.org/index.cfm?Page=Scavenger_Hunt
In this article, Allen W. Achilees shares tips for teachers and teens to help them have a more secure and safe online experience.
Based on a security breach of a popular site with teens, it was surprising to find out the most common passwords. Even though it may be cumbersome and tedious, teens and adults should create strong passwords. Do you use any of these common ones?
As in many states, students in Illinois are required to receive a certain number of hours of instruction each year dedicated to Internet Safety. While the idea is noble, the parameters are sketchy. Some schools have an “Internet Safety Day” or some such “special occasion” but too often these “occasions” serve no purpose other than compliance with the requirement and very little learning occurs.
http://www.techlearning.com/article/52762
This eye-opening article discusses various aspects of the use of social media websites by teens. Very interesting read.
If you are needing to communicate your curriculum to parents and the community, you might find this method a good overview that can quickly be shared.
http://www.nwcsd.k12.ny.us/Page/377
In this article, Jeff Dunn discusses the teacher's role in keeping students safe online. Several tips as well as additional resources are shared to assist teachers in this task.
“It might surprise parents to learn that it is not a waste of time for their teens to hang out online,” said Mizuko Ito, University of California, Irvine researcher and the report’s lead author. “There are myths about kids spending time online – that it is dangerous or making them lazy. But we found that spending time online is essential for young people to pick up the social and technical skills they need to be competent citizens in the digital age.”
MacArthur Digital Media and Learning Report
Use of social media and its success in schools.
Educators would like more training, professional development, and direction on using social networking and other technology from school/district leaders. Although educators are joining social networks, they express a need for guidance, training, and professional development.
Many educators have a high level of concern about joining social networking sites. They are concerned about privacy; they have very little time; and they get too much email.
Schools and districts often block access to sites, and many educators are frustrated by this....
Source: A Survey of K-12 Educators on Social Networking and Content-Sharing Tools, EdWeb.net
Educators who have joined a social network are more positive about the value of this technology for education than those who haven’t, but they want the ability to separate their personal and professional communications.
Source: A Survey of K-12 Educators on Social Networking and Content-Sharing Tools, EdWeb.net
Students who attempt to multi-task, checking social media sites while studying, show reduced academic performance (http://viralms.com/blog/2011/04/how-social-media-affects-students/). Their ability to concentrate on the task at hand is significantly reduced by the distractions that are brought about by YouTube, stumbleupon, Facebook or Twitter. Social networking has increased the rate and quality of collaboration for students. They are better able to communicate meeting times or share information quickly, which can increase productivity and help them learn how to work well in groups. (Source: http://edudemic.com/2011/07/social-media-education/)
Social Media Best Practices (Suggested)
Tools to Manage Social Media/Networking
Tweetdeck.twitter.com - An easy tool to manage your twitter feeds.
Hootsuite.com - This is a great tool that allows you to manage multiple Twitter (e.g. personal vs work) accounts, as well as Facebook within one screen. You can also direct the RSS feed (find out what RSS is) for a blog, wiki or twitter feed through Hootsuite.com to enable "auto-posting" of content. This can be a real time-saver. And, you can also schedule Tweets to appear AFTER the work day, which makes it convenient. View Hootsuite How To Tutorials online.
HashTags - This is a search engine that allows you to search Twitter, whether by account or hashtag. For example, you can do a search on the hashtag #edchat to see what people are sharing for education audiences. You can also search on a particular username, @mguhlin, to see what they have been tweeting.
Educational Uses of Facebook
How to Create a Facebook Page for Your Classroom (video) - You might also want to step through this tutorial slideshow.
Facebook in Education - How to create a Fan Page (Youtube link)
Matt Gomez (Texas Kindergarten Teacher) on Classroom Facebook Page
Educational Uses of Twitter
The 10 Best and Worst Ways Social Media Impacts Education
Twitter for Academia - suggests 13 different ways to use Twitter in the classroom.
PDF file discusses the experience of teacher Ana Dominquez using Twitter in the Kindergarten classroom.
Other Resources
Videos used in Presentation
Children Learn What They Live - http://youtu.be/diUB7OGRJ8E
Principal on Social Media Use in Education - http://youtu.be/Zl90Sd9JkMI
Domino's Video about hoax - http://goo.gl/tBFDZ
Cardboard Confessionals - http://www.youtube.com/watch?v=e912iuGqb6g
What's Your Sentence? - http://www.youtube.com/watch?v=gw2xSdp4bOc&NR=1
Response - http://www.youtube.com/watch?v=AyRu7k70Jhc
Response - http://www.youtube.com/watch?v=xjBmnfI4Tn4
Student Response - http://www.youtube.com/watch?v=AvtxConAuHs
How to Organize on Facebook - A fascinating guide to Facebook for social justice.
Cybrary.it (Free)