Skip To Main Content

Tech Talk Blog

Tech Talk - The Help Desk Journal

You may notice an update in your Gmail / Google Workspace. Google has a new navigation menu to allow you to easily switch between your Inbox, Chat, Spaces, and Meet. The rollout began today. If you haven't noticed it yet, it will be coming soon.With this update, Chat will no longer be in the lower right corner of the browser window, but instead found on the right side in the navigation menu.

Navigation in List View

Navigation in Icon View

  • Email
  • Google Workspace

Keeping the Creative Cloud updated is important as the updates that occur can sometimes be wildly beneficial to the user.  They can improve load times, add quality of life changes, or even improve security.  I've created a quick video on how to update Adobe so that you can get the most out of your programs.

If the video is not viewable below, it can be found on our channel within Microsoft Stream.

You are checking your email and see one from your boss or coworker and you open it.  They say they are stuck in a meeting and need you to run an errand to buy them gift cards for their great nephew’s cousin’s best friend’s sister’s dog’s birthday present.  This is a suspicious email, and there are many others like it to try and trick you to giving out personal information or to steal your money.  Knowing the signs and tricks of these malicious senders can help you prevent a security breach or losing your hard-earned money.

Phishing Emails

Phishing emails are messages that attempt to gain access to your accounts by tricking you into sending logins or passwords.  This can come about in a variety of ways, but usually the sender poses as a company you have an account with, then can say something like “Your account has been compromised, please click this link to confirm your login” and steal your information through the bad link you clicked.  Many of these emails look identical to the real thing, so how can you tell the company from the phisher?

By checking the email address of the sender, you can check to see if the domain name is correct for the company.  For example, an email address of “confirmation@apple.com” is much more trustworthy than “confirmation@grapefruit.com” because the domain name isn’t accurate.

Spoof Emails

Spoof emails are any email that says it comes from a person, but the email address is not correct.  Like we saw with the phishing emails, the domain name is often incorrect when dealing with a spoof email.  However, spoof emails can appear like they are from anyone, like your coworkers or boss.  You could receive an email that looks like it is from someone you know, but it could have malicious attachments or ask you to buy gift cards.  Often when you open these emails, the writing style of the person is off from what you know, it may be lacking their usual signature, and it could have bad grammar.  All of these should be red flags in your mind, all of which can be confirmed by an odd email address like the phishing ones mentioned earlier.

Compromised Emails

Unlike spoof emails, these emails come from a legitimate email of someone you know.  That person’s email was hacked, which can happen if they click on something suspicious or perhaps fell victim to a phishing email.  This makes it more difficult to tell if the email is legitimate because you cannot check the email address. However, the writing style, signature, and bad grammar mentioned earlier can still apply.  If you are suspicious, don’t click anything.  When in doubt, give the person a call or ask them in person if they sent you the email.

What Do I Do If People Tell Me They Are Getting Suspicious Emails from Me?

Most often, the emails they are receiving are spoof emails.  There is not much you can do with those, and they are harmless so long as no one clicks anything or sends money.  The best course of action is to have the receivers verify that the email address is not your real email address, and then let your coworkers know about the spoof emails so they are prepared to delete them.

What If My Email Is Actually Compromised?

Firstly, you should call helpdesk at (906) 632-5673 or extension 5673 to let them know the situation.  You will have to change your active directory password, which will change email and computer passwords.  Then let your coworkers know to look out for suspicious emails from your account and let them know you are compromised.

  • Cybersafety
  • Email

Throughout the region, grade 12 students have graduated and are moving on to the next phase of their lives. Many of these graduates are enjoying that one last summer before a job-search, college, or military service. Some time, around September or October, some will realize that they had created materials or created accounts with their school email that may be helpful in their current endeavors. So, what happens to those accounts?

Phase 1 - Same Access

Once a student graduates, their accounts remain fully active through September 30th of the year of graduation. 

Phase 2 - Email Only Access

October 1st through December 31st of the year of graduation, student accounts are set to email-only. This will provide a limited window in which they may update their contacts to provide a new, personal email address.

Phase 3 - Account Disabled

January 1st of the year following graduation, student accounts are disabled. Once this occurs, graduates needing access to their account will be directed to the Superintendent of their school district. Only a Superintendent may authorize and request access to an account which has been disabled.

  • Email
  • Google Workspace
  • OneDrive

Software runs our schools, whether it is for collaborating, billing, attendance, communication, or any other aspect of your district. Unfortunately, outdated or misconfigured software is a highly sought-after target by attackers; with it, they can gain a foothold in your systems and potentially exfiltrate data. Because schools host a wide variety of software applications to support the needs of students and staff, it is important to know common security practices relating to software in order to stay secure and to prevent a data breach.

Managing Application Software Security

Among other things, by centrally managing a list of approved software, your district can keep programs updated with the latest security patches, and more  importantly, validate whether or not the responsible vendor is continually supporting the product. Unsupported products do not receive security patches, which is a significant risk.

During the summer of 2021, regional technicians are contacting administrators to compile a list of approved software for each district.

Learn More

Decisions regarding the use of software and apps by teachers and students lie with District Administrators. Teachers and administrators may review the Software and Apps Authorization Process to learn more about this important process that brings teachers, curriculum development teams, district administrators, instructional technologists, REMC22, and technical services together to ensure system and data security.

Source: Essential Cybersecurity Practices for K12
Goal 18: Application Software Security

Board Policy 2510: Adoption of Textbooks