Changes to Computer Technician Building Assignments

Effective Monday, March 3, 2025, building assignments for our computer technicians will be adjusted to bring greater efficiency and responsiveness in our work. This change comes as a response to the feedback we have received from staff and analysis of our technology tickets. We expect there may be some challenges as our team transitions to their new building assignments, however, we believe these changes will result in faster response times and resolutions to technology issues. 

To assist us with providing you better service, we ask that all technology-related issues be submitted as a Technology Request in ML WorkOrders. We recognize that some staff may prefer to communicate directly with a technology staff member rather than submit a ticket. However, using the ticketing system allows us to effectively manage and respond to everyone’s needs, ensuring no requests are missed or delayed. We are continuously working to improve our technology request system, and we will soon be introducing self-service options that may help you resolve issues even before submitting a ticket.

As a reminder, you can submit a Technology Request ML WorkOrders by going to helpdesk.pccsk12.com or selecting Tech Request Form under the P-CCS Bookmarks folder in Chrome.

We look forward to better serving the needs of the P-CCS community.

Primer on Social Engineering and Mining

As we continue to see a rise in various kinds of attempts to take advantage of our network, here again is a simple review of some of those ways being used. Bottom line, PLEASE STAY VIGILANT to STAY SAFE!

Social engineering is an attempt to trick an individual into revealing information or taking an action that can be used to attack systems or networks. Social mining is an attempt to gather information about the organization that may be used to support future attacks.

Examples of commonly used types of social engineering:

phishing Phishing is a digital form of social engineering that uses authentic-looking emails to trick users into sharing personal information. It usually includes a link that takes the user to a fake website. If you cannot verify the source, do not open the link. Report suspicious messages to your IT team.

  • Spear Phishing is a type of phishing where a specific user or group of users is targeted because of their position (such as a company’s administrators).
  • Quishing, short for QR code phishing, is a type of phishing where a QR code is used to trick users into visiting malicious websites or downloading malware.

social media Social media exploitation is where the attacker uses information found on a user’s social media profiles to create a targeted phishing attack.

Pretexting and Impersonation is where the attacker creates a fictional backstory that is used to manipulate someone into providing private information or to influence behavior. Attackers will often impersonate a person of authority, co-worker, or trusted organization to engage in back-and-forth communication prior to launching a targeted spear phishing attack.

  • calling Fake IT Support calls are a common form of impersonation where someone pretends to be an authorized user or administrator in an attempt to gain illicit access to protected data systems. The attacker has enough information to sound credible, and they ask the user for some bit of information that will allow the attacker to gain access to the desired system.

Baiting is the use of a false promise to lure the user into a trap, including enticing ads that lead to malicious sites or encourage users to download a malware-infected application.

  • scareware Scareware is a type of baiting where the use of false alarms or fictitious threats lure the user into a trap. One example is the attacker convincing a user that their system is infected with malware and that they should install software granting remote access. Another example is the attacker claiming to have sensitive videos which will be released if the user does not pay.
  • Quid pro quo is a type of baiting where the attacker requests the exchange of some type of sensitive information such as critical data, login credentials, or monetary value in exchange for a service. For example, a user might receive a phone call from an attacker who, posed as a technology expert, offers free IT assistance or technology improvements in exchange for login credentials.

coming in with someone elseTailgating, also known as “piggybacking”, is where an unauthorized person manipulates their way into a restricted area, such as impersonating a well-known role (e.g., delivery driver or custodian worker) or asking a user to “hold the door”.

  • Thread-jacking is a type of digital tailgating where the attacker replies to an existing email exchange, inserting themselves into a legitimate conversation.

avoidsnoopsShoulder surfing is where an unauthorized person stands near a user to get the user’s password or other data from the user’s computer monitor.

  • Angle your computer so that other people cannot see what you are typing

    Use a privacy screen to make your screen less visible to others

    If possible, sit or stand with your back to a wall when entering a password on a device in public

    Try to avoid viewing restricted information in public

    Shield forms from viewing when filling out paperwork

    Use strong passwords to make it more difficult for someone to guess what you typed

    Remember to lock your computer or device when you leave your desk

Some new Google updates and features

slides.google.com released a number of updated templates, in Google Slides, access templates using the top toolbar or by going to Insert > Templates. Visit the Help Center to learn more about templates in Google Slides.

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

Star rating in Google Forms – you can now insert a “star rating” question in Google Forms.

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

eSignature available to collect in both Google docs and PDFs within Google Drive

eSignature offers a variety of features to help you streamline requesting and capturing signatures, helping you stay organized and keep your work moving along. Specifically, you can:
  • Request eSignatures, including signatures from more than one user and from non-Gmail users.
  • View the status of pending signatures and find completed contracts.
  • Keep contract templates to initiate multiple eSignature requests.
  • View an audit trail of completed contracts.
  • Use custom text fields to request additional information from signers, such as job titles, email addresses and more.

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

Google Lens now built within Google Chrome allows you to quickly take a snapshot of anything in the browser and get more info (see example at https://www.youtube.com/shorts/J1dQSiBMrPk)

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

New Adobe Express Add-on for Google Slides
Install the Adobe Express add-on for Google Slides and get access to lightweight creative tools that let you edit images, visually enhance presentations, and create flyers, infographics, & more. Adobe Express for Education is the quick & easy content creation app from Adobe — free for K-12.  visit https://workspace.google.com/marketplace/app/adobe_express_for_google_slides/682264952061

 

Misc sites for your consideration

Useful Sites

In no particular order…

https://bioart.niaid.nih.gov/  Build figures, presentations, and illustrations with 2,000+ science and medical art visuals

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

https://phishingquiz.withgoogle.com/  Google’s phishing quiz to help us be more vigilant when it comes to emails

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

https://sethideclercq.com/teachingtools/  assorted teacher tools created with minimalistic design principles in mind

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

https://artsandculture.google.com/art-zoom-out with the help of generative AI, Google helps you Zoom Out and envision what might lie beyond the frame of iconic paintings.

https://artsandculture.google.com/experiment/2gFc5DkygEURfw Art Remix puts your AI prompting to the test, presenting artworks alongside a prompt that describes them, challenging you to edit the prompt and imagine the work with your own twist.

https://artsandculture.google.com/experiment/food-mood/HwHnGalZ3up0EA  food mood combinations

https://artsandculture.google.com/project/uslatinocultures explore Latino cultures in the US

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

http://www.gearsket.ch/  a fun, simple web app for experimenting with gears

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

https://labs.google/gentype  uses AI to generate custom fonts using everyday object directions  other labs https://labs.google/experiments might be of interest too

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

https://blog.google/technology/ai/notebooklm-audio-overviews/ reviews audio summations of sources you submit in notebooklm.google.com

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

https://www.sonicentric.com/  relaxing, themed videos

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

https://noises.online/  simple noise generator

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

https://sandtimer.toolten.io/  if you want a digital hourglass with lots of customization options

*****~~~~~—–~~~~~—–~~~~~—–~~~~~*****

https://www.canva.com/designschool/courses/teacher-essentials/?lesson=welcome-teacher-essentials  Canva teacher essentials

 

 

 

Barely a week away, sharing a reminder – thanks!

We hope you enjoy your winter break, arriving just eight days from now! Before you leave next Friday afternoon…

WOULD YOU PLEASE SECURE ALL VALUABLES in the classrooms and office spaces you inhabit. This includes laptops, document cameras, Apple TVs, remotes, and interactive pens.

Further, if it is equipment you handle, would you please make sure all iPads and Chromebooks are in their carts and those CARTS ARE LOCKED and plugged in before leaving.

Finally, would you please also POWER OFF any of the following equipment, if it is equipment you handle:

  • projectors
  • sound amps
  • SmartBoards
  • desktop computers
  • monitors
  • printers

THANK YOU for your cooperation.

Tech break checklist

Linewize Content Filtering on P-CCS Google Accounts

Linewize

The district’s adoption of Linewize provides several advantages for our students, staff, and families. We have streamlined our content filtering process, leading to a more user-friendly experience and simplified troubleshooting. Our educators can now leverage Classwize for digital classroom management across various devices (Chromebooks, MacBooks, and Windows) and have the ability to customize classroom-specific filtering rules (within established parameters). Furthermore, Qustodio empowers families to monitor their students’ online activities outside of school hours, even on personal devices, promoting a safer digital environment.

An additional advantage of Linewize is our ability to implement filtering rules based on user accounts, not just devices. This means P-CCS Google accounts will have content filtering applied whether they are used on district-owned or personal devices. When students or staff log into the Chrome browser with their P-CCS Google account, the Linewize extension is automatically installed, ensuring that the district’s filtering policies are applied within that browser window. It’s important to note that these filtering rules only apply to activity within the Chrome browser while signed into a P-CCS Google account.

Users can browse without Linewize content filtering on a personal device by signing out of their P-CCS Google account in Chrome, creating a separate Chrome profile not associated with their P-CCS account, or using a different web browser altogether.

Please note that signing into the Chrome browser is different than signing into any Google website. Signing into Chrome syncs your browsing data and settings, while signing into a Google website only grants access to that specific site and other Google websites.

REMC October courses can support your new school year initiatives

REMC October courses

REMC courses are designed to enhance your teaching toolkit and foster engagement and student learning. Whether you’re looking to inspire your classroom with innovative teaching methods or simply want to refresh your approach, REMC courses provide the perfect opportunity.

With the convenience of virtual learning, you can complete these courses from the comfort of your home, at a time that fits your schedule. Plus, upon completion, you’ll earn 10 FREE SCECHs!

Registration deadline is Thursday, October 3rd, each course begins on Monday, October 7th. Thanks to the generous support of REMC SAVE’s vendor partners, all courses are FREE and there are no SCECH fees. Don’t miss out on this opportunity to expand your skill set and strengthen your classroom!

Register for October courses here:

Register by Thursday, October 3rd. You will receive a welcome email with the course information prior to the course start date. If you have questions or need further assistance with your course registration, please click here.

MISTAR-Q: Supportive Training for (New) Teachers

Registration is open for Q ACADEMY: TEACHER EDITION (formerly Monarch)
Aug 26 through Dec 2, 2024
Registration fee: $0

Teachers are invited to participate in Q Academy: Teacher Edition, an asynchronous online course formerly known as Monarch. While this course is rebranded and reorganized, the learning activities remain the same as Monarch.

Working online at your own pace, you will complete activities designed to increase your skill and knowledge of MISTAR teacher apps including Class Attendance, Grade Book, Seating Chart, generating reports, and more. This course is especially beneficial for teachers new to MISTAR.

You may earn between 1.0 and 17.5 SCECHs, depending on which topics are completed by Dec 2, 2024. At least two topics must be completed to qualify for SCECHs and you may select which topics to complete:

Q Academy training

Should I register for Q Academy if I previously participated in Monarch?
The activities are the same – if you completed Monarch, you completed all content in Q Academy.  If you participated in Monarch but did not complete the course, you are welcome to register for Q Academy but your progress will not transfer from Monarch.

Register here  – After registering, watch for emails on Aug 26 with details on how to get started.

Please register only if you fully intend to participate as there is high demand for this course.

Access to Microsoft Office 365 desktop apps ending in August

A1 Plus retirement

Earlier this month, Microsoft notified our district that they would be ending our access to Microsoft Office 365 desktops apps when they retire our licensing program (Office 365 A1 Plus) on August 1, 2024. Their announcement impacts all school districts with the same licensing. While we shared with them our frustration for the short notice, they aren’t changing the retirement date. After August 1st, staff that have downloaded and installed Office 365 versions of Word, Excel, and PowerPoint will find those programs no longer work. You can identify if you have an impacted program by launching one of those programs and looking in the top right corner for your name and initials. If you see your name and are signed in, you have a program that will stop working in August. See this pic for a sense of where to look in Word.

where to locate name in Office

Some options post August 1st for those impacted.

  1. Use the Google Workspace for Apps (Recommended). As a Google Workshop for Education district, it is strongly recommended that staff use Google Docs, Sheets, Slides, etc. All of these apps (and more) are available through Google Drive.
  2. You can still use Microsoft Office 365 online since that licensing remains. Browse to portal.office.com and sign in using your email address and network (not Google) password.
  3. Use a free office suite alternative, such as Libre Office, which is available in the Company Portal for those that want to download and have installed a desktop office suite. Libre Office is highly compatible with Microsoft Office documents. It can open and edit all of the Microsoft Office file formats, as well as save in those same file formats. See this video guidance for how to set it up to natively load and save in Office formats.
  4. Departments/schools interested in purchasing licensing for Office 2021 for one or more of their staff can submit a service request so our department can work with the requester on their purchase and our installation. Current REMC pricing for Office Standard runs through June. The new purchase price will be updated in July (see here for July and beyond pricing). 

 

Watch Out for Phishing Emails – A Warning for Teachers (and all others)

phishing icon

Phishing is a form of cyber attack that has become increasingly common and sophisticated in recent years. As teachers, we need to be on guard against these malicious attempts to steal our login credentials, personal information, or install malware on our devices.

What is a Phishing Email?

A phishing email is a fraudulent message designed to look like it comes from a legitimate source, such as a company, bank, or even our own school district. The email may ask you to verify account information, login with your credentials on a fake website, or open an infected attachment or link.

The goal of the attacker is to trick you into divulging sensitive information or deploying malware on your computer or the school’s network. Phishing attacks rely on social engineering to exploit human psychology and tendencies to trust.

How to Spot a Phishing Email

While phishing emails can be quite convincing, there are some common warning signs to watch out for:

  • Emails creating a sense of urgency, fear, or panic to prompt an impulsive reaction
  • Misspellings, bad grammar, or inconsistencies in the email content or sender address
  • Requests for sensitive information that a legitimate company should already have
  • Generic greetings like “Dear User” instead of your name
  • Suspicious links or attachments

Remember, legitimate companies will never ask you to provide things like passwords or credit card numbers via email.

Stay Vigilant

As teachers trusted with handling confidential student data and accessing sensitive school systems, we must remain vigilant against phishing scams. Always scrutinize email sources, hover over links before clicking, and avoid opening attachments unless you are absolutely sure they are safe.

If you suspect a phishing attempt, do not respond and immediately report it to our IT department by clicking the phishing hook icon in our email. On mobile, it may be toward the bottom of the email and on a laptop it is off to the right. This will report the phishing attempt to the district.

phishing icon

Protecting ourselves and our district from these cyber threats is crucial. Let’s do our part to identify and stop phishing attacks before they cause harm. A few moments of caution can prevent a major security breach.