Tuesday, January 30, 2018

Dance Like No One is Watching; Email Like It May One Day Be Read Aloud in a Deposition

Olivia Nuzzi tweeted, "Dance like no one is watching; email like it may one day be read aloud in a deposition" in response to hacking of the Democratic National Committee emails. With the possibility of open records requests and the ease of resharing digital communications, it is important to remember there is limited expectation of privacy anywhere online especially when it comes to your professional communication.

When using district email and chat, remember that everything is on the record. For this reason, it is wise to think before you hit send.


Here are some tips for keeping email professional and avoiding any embarrassment in the event that your communications become public:

  • Keep your language professional
    • In many of the recent high profile email hacks, public figures have been criticized not only for using vulgarities or obscenities, but also, for their overall tone, spelling, punctuation, use of emojis, etc. While your intended audience may allow you to communicate informally, think about how others might perceive your communication style. Does it reflect how you'd like to be judged as a professional?
  • Avoid venting
    • Email is a great tool for sharing information and creating an ongoing dialogue. It is not a good place to vent. When you feel the urge to vent, it is best to take a deep breath and refrain altogether. If the need doesn't pass, it is better to seek out a face-to-face or phone conversation. 
  • Add your email recipients last and double check 
    • Adding your intended recipients last helps keep your email as a draft until you are ready to send. As an added precaution, I also recommend enabling "undo send" in your email settings to create a short delay. Finally, while our global address book is convenient, it is also easy to select a recipient with a similar name. Make sure to double-check that you have selected the proper email address.

Tuesday, January 23, 2018

Custom Bullet Points in Google Docs and Slides

It is easy to customize bulleted lists in Google Docs and Slides if you want more than the default options available. The list icon can be found in the toolbar and a dropdown shows the default options available. To add a customized option, go to Format, Bullets & Numbering, List Options, and select More bullets.


This opens a menu of special characters. You can browse options, use the search bar to help find specific shapes, or draw your own icon to use.


For more help with features and options available for bulleted lists, including restarting numbered list and adjusting indents, check out Google's Help Guide.

Tuesday, January 16, 2018

Google Classroom Training Center

Google has created a great toolkit with videos, tip sheets, and professional development resources for getting started with Classroom. Start with "the basics" by checking out a set of videos on setting up your Classroom and inviting students then learn to create assignments, add materials, and provide grades and feedback. Visit the "Teacher's Lounge" to get video tips from teachers. Google also provides some "Handy Guides" with step-by-step Classroom directions and quick tips.


Get started on your #FirstDayofClassroom today by visiting the Classroom Training Center.

Tuesday, January 9, 2018

January 1 - April 15 is Phishing Season

While phishing attacks can occur at any time, there is an increase in attacks between January 1 and April 15. As a reminder, phishing is a tactic designed to steal personal data (think passwords, credit card numbers, banking information, etc) and/or install malware on your computer. Phishing attacks come in many forms. Emails that impersonate popular companies and services (banks, dropbox, Google, etc) are most common. Spear-phishing occurs when attackers send emails that appear to come from your trusted contacts, such as, coworkers, friends, etc. Attacks may also make phone calls impersonating others and use other methods to obtain your personal information.

Check out the following tips to avoid falling victim to phishing scams:

Be Skeptical
If something seems suspicious, use caution. Typos, too many exclamation points, and other grammatical flags can be used to question the legitimacy of emails. 

Check the sender's address. Don't trust the display name alone: hover over the display to see the full email address. Does it match other communications from the organization?

You can also hover your mouse over any links embedded in the body of the email. If the link address looks weird, don’t click on it. If you want to test the link, open a new window and type in website address directly rather than clicking on the link from unsolicited emails. 

Is the email addressed "Dear Customer" or with another generic salutation? If so, be cautious —legitimate business emails will often personalize their greetings with your name.

Legitimate banks and companies will never ask for personal credentials via email or phone. Don’t give them up.

Invoking a sense of urgency or fear is a common phishing tactic. Beware of subject lines that claim your “account has been suspended” or your account had an “unauthorized login attempt.” Urgent language is designed to make you act before thinking.

Lack of details about the signer or how you can contact a company strongly suggests a phish. Most companies have an official signature.

Including malicious attachments that contain viruses and malware is a common phishing tactic. Malware can damage files on your computer, steal your passwords or spy on you without your knowledge. Don’t open any email attachments you weren’t expecting.

Phishers are extremely good at what they do. Just because an email has convincing brand logos, language, and a seemingly valid email address, does not mean that it’s legitimate. Be skeptical when it comes to your email messages—if it looks even remotely suspicious, don’t open it.


Choose Strong Passwords and Keep them Secure
One of the best ways to protect against phishing attacks is to use secure password management strategies. Passwords should be unique for each of your logins, with master passwords like your district synced credentials, being the strongest and most secure. While tempting to select passwords based on personal information is tempting, these passwords are often also the least secure and easy for others to guess. Examples: favorite sports team, family names, pet names, etc. The most secure passwords contain a random string of words. Passwords are also only as secure as how you store them. If you must write them down to remember them, make sure they are stored in a secure location--not on your monitor, under keyboard, etc. 

Password Resources:
  • Take the password quiz Carnegie Mellon University designed to assess your perceptions of secure passwords. 
  • Last Pass is a password manager that allows you to set one secure password to manage randomly generated passwords for the websites you visit.
  • Password Alert gives you a warning when it detects you reusing passwords across sites.
  • How Secure is My Password estimates how long it would take for someone to hack your password.
Use 2-Factor Authentication
To keep your district accounts secure, I highly recommend enabling 2-Step Verification to protect your account credentials. Since we sync your passwords across multiple websites and applications, it is critical that we all do our part to protect our accounts. This extra step does not take much additional time and keeps bad guys out even if they are able to obtain your password. Information about how it works and a link to step by step directions follow. 









Tuesday, January 2, 2018

Technology Coaching Menu

As technology coaches, our goal is to support educators in creating an effective digital learning environment for students. We are available to work with you on anything involving instructional technology and learning, including, but not limited to:

  • Researching and identifying the best technology tools and resources for meeting your instructional and learning goals
  • Co-planning differentiated activities with choice assignments, projects, and activities 
  • Co-designing lessons with effective technology integration
  • Co-creating digital assessments and feedback loops
  • Co-teaching lessons (While building coach schedules are limited, Katie would be happy to co-teach with you)
Thanks,
SDMA Technology Coaching Team

Jaclyn Arnold, Downsville
Laura Garfield, Knapp
Matt Wigdahl, Oaklawn
Zac Rubenzer, Oaklawn
Kyle Gregerson, River Heights
Hannah Klingfus, Wakanda
Heidi Anderson, Wakanda
Amanda Harrison, MS
Holly Gallbreath, MS
Jennie Cimino, MS
Becca Workman, MS & SPED
Andra Smith, HS
Kayla Oliver, HS
Michele Huppert, HS
Katie Krueger, ASC