Get our RSS feed here!
Need Advice on Tech Ed?That's what we are here for. We want to help teachers and educators integrate technology in the classroom in sensible and relevant ways. Just drop us a line by commenting on any of our posts and we will get back to you as soon as we can. And don't get stressed out...crack open a cold one on us :o)
Searching for an article?
Tag Archives: security
By: Tony DePrato | Follow me on LinkedIn How many documents do you have open to the public? When was the last time you checked to see what anyone with internet access could download from your school website, your PowerSchool … Continue reading
By: Tony DePrato | Follow me on Twitter @tdeprato Recently I have been discussing multiple new security measures for academic networks. From these discussions with other schools, engineers, and suppliers, I have created set of goals to help keep the development of network … Continue reading
By: Tony DePrato | Follow me on Twitter @tdeprato The International Educator Blog Post on Ransomeware
By: Tony DePrato | Follow me on Twitter @tdeprato On Friday, 12 May 2017, a large cyber-attack using it was launched, infecting more … Continue reading
This is one of those posts that I may regret writing in a few months. It is more of a plan than a post, and a plan I intend to sell with significant confidence. Starting in the fall, when students … Continue reading
Richard Dent, Chicago Bears Superbowl MVP Catchy title- but statistically not accurate. I trust the people at Freakonomics a bit more than I trust my family screaming at the TV on Thanksgiving. So is this post about statistically irrelevant phrases? … Continue reading
When working in a corporate setting, the IT department will normally set a password expiry date, and on that date, everyone will be prompted to change their passwords. This is seen as a simple straightforward process that does not require … Continue reading
The Problem Recently there has been press on a new Cyber-Weapon called FLAME. Now many of you might be wondering why I called it a Cyber-Weapon. Well here are a list of things it can do: Record audio from your … Continue reading