![]() |
Click here for full size view |
Now that we've learned about cybersecurity at work and phishing, this week we move on to More Than Just Phishing. Emails are just one tool in a cybercriminal's toolbox, so it's important to be able to recognize other types of social engineering attacks, such as tech support scams, texting scams, and how to keep info secure on a mobile device. In addition, it's helpful to know what personal information hackers are interested in, and how you can keep it private.
- KnowBe4 Interactive Training Module: 2022 Social Engineering Red Flags
- Tech Support Pretexting - Would You Fall For It?
- Protect Your Personal Information - Hints and Tips
- 20 Ways to Block Mobile Attacks
- Google Workspace Updates
- A Classic - How to Use Classtools.net to Create a Fake Text Message Exchange
- How to Set Up and Run a Classroom Escape Room
- Calm Your Classroom with Classroom Zen
- These 5 Big Ideas are All You Need to Teach Internet Safety to Your Students
KnowBe4 Interactive Training Module: 2022 Social Engineering Red Flags
Social Engineering is the leading cause of security breaches to an organization's network. How well do you recognize social engineering attempts? In this Knowb4 training module, which is free to access until October 31, 2022, see if you can recognize social engineering red flags. The module takes about 15 minutes to complete, and will explain all the warning signs to watch out for. Feel like you need a refresher before taking the lesson? This study guide will help you out. How well did you do?
Tech Support Pretexting - Would You Fall For It?
This roughly five-minute video shows a social engineering attack using pretexting. Pretexting is a form of social engineering where the attacker lies to obtain restricted information. Watch it here.
Protect Your Personal Information - Hints and Tips
Check out these hints and tips about protecting your personal information from KnowBe4. Identity theft is common. You probably know someone has been a victim and don't realize it.
20 Ways to Block Mobile Attacks
There are so many ways your phone can become vulnerable to attack. While most people are aware of voice call scams, text message scams have become even more popular than emails lately. Some WiFi and apps are gateways to a hacker's paradise. Learn all the ways to protect your information on a mobile device here.
Google Workspace Updates
Google Sheets: Easily Add Link to Events and Docs
Google has expanded the use of Smart Chips in Sheets to make it easier to add a link to Calendar events and Docs and Sheets files. Smart Chips are the little cards or menus that appear when a users enters @ into a cell in Sheets, or type it in a Doc. With these updates, when you enter @ in a field, you be able to choose not only a contact, but also a calendar event or a Doc or Sheets file. It will automatically add a link to that event or file, and anyone who clicks on the link will be able to see any other related info about that event or open the file. Both updates should become available around October 25th. See full details and instructions for adding events here. Information about adding a Doc or Sheets file are available here.
Google Meet: Transcribe Speech Into a Google Doc
This new feature will only work on a desktop or laptop computer - not on a mobile device. This update is similar to Meet recordings, but will now be available as a written record of the Meet. For meetings with fewer than 200 attendees, the meeting host, co-hosts or transcript initiator will receive the transcription document via email after the meeting ends. For recurring meetings, the transcript will be automatically attached to the associated calendar invite for the meeting. For meetings with more than 200 attendees, the transcription will only be shared with the meeting organizers, host, co-hosts, and individuals who initiated the transcription. Before joining the meeting, attendees will see a notification informing them when transcripts are active. If the host or co-hosts have turned host management on, only hosts and co-hosts can turn on transcriptions. If host management is off, anyone in-domain participants can use transcripts. This new feature should be available by mid-November. Here are the full details.
A Classic - How to Use Classtools.net to Create a Fake Text Message Exchange
A Classic - How to Use Classtools.net to Create a Fake Text Message Exchange, From Free Technology for Teachers by Richard Byrne
This privacy-friendly site does not require creating an account. You can either reuse games that have already been created, or make your own. Then you simply share the link with students. There are so many tools on this site, in addition to creating a fake text message exchange, and they all seem to be easy to use.
How to Set Up and Run a Classroom Escape Room
How to Set Up and Run a Classroom Escape Room, From We Are Teachers
Keep in mind, there a couple of lock box kits at the upper campus for teachers to use.
Calm Your Classroom with Classroom Zen
Have you heard of Classroom Zen? It's a simple website for teachers and parents with tools to provide calming countdown timers, daily breathing and mindfulness techniques, as well as brain breaks. You can set the sensitivity level so the timer stops if the noise level gets too high. How long can your students keep the timer going?
These 5 Big Ideas are All You Need to Teach Internet Safety to Your Students
These 5 Big Ideas are All You Need to Teach Internet Safety to Your Students, from We Are Teachers by Meghan Mathis
This is a good resource to use to enhance the digital citizenship program you are already using. ASA students already have access to Be Internet Awesome, with links in their bookmarks folder and on the web landing page they see when they open their chromebooks. Tech instructors have used this at ASA for several years.
No comments:
Post a Comment