Skip to toolbar


Every class below offers 10 FREE SCECHs.

March 2020  Course Information

March courses begin on Monday, March 2.  The deadline for registration is Friday, February 28.  

Courses descriptions are provided below. If you have questions or need further assistance with your course registration, please contact the REMC Event Coordinator.

Remove These Chrome Extensions

Google has removed 500+ Chrome Extensions that Cisco’s Duo Security team identified as Malware. While Google has removed them from the store for download, they did NOT uninstall them from user accounts.

This means that if you downloaded one of the extensions, it may still be running. You should delete the extensions immediately. *These are NOT installed on Dearborn Public School Accounts.

To delete an extension:

  • Open Chrome
  • At the top right, click on the 3 buttons
  • Select More Tools
  • Select Extensions from the pop out window
  • Click the “Remove” button under any extension that you want to delete
  • Click the “Remove” button that pops up in the confirmation window

Here are SOME of the chrome extensions that were removed (and thus, you’ll want to remove as well). *Note that I didn’t list the random gibberish extensions. ** For a Full List, go to Duo Security and look at Section 9.

  • Ad offers by Froovr
  • Ads by MapsVoyage
  • Advertisement Offers by QuizKicks
  • Advertisements by ArcadeYum
  • Advertisements by MapsScout
  • Advertisements by QuizDiamond
  • Advertising by MapsFrontier
  • Advertising by MapsPilot
  • Advertising Offers by FreeWeatherApp
  • Advertising Offers by MapsPilot
  • Advertising Offers by MapsVoyage
  • Advertisment Offers by GameDaddio
  • ArcadeCookie Offers
  • ArcadeFrontier Ads
  • ClassifiedsNearMe Promos
  • ClassifiedsNearMe Promos
  • CouponRockstar Offers
  • CrushArcade Ads
  • DearQuiz Advertising
  • DeluxeQuiz Advertising
  • EarthViewDirections Promotions
  • EasyToolOnline Promos
  • EasyToolOnline Promos
  • ExpressDirections Ads
  • ExpressDirections Promos
  • ExpressDirections Promos
  • FreeWeatherApp Advertisement Offers
  • FreeWeatherApp Promos
  • FreeWeatherApp Promotions
  • Froovr
  • gamedaddio
  • GameDaddio Marketing
  • GamesChill Ads
  • GameZooks Advertisements
  • GoFreeRadio Promos
  • GreatArcadeHits Ads
  • JumboQuiz Advertising
  • LoveTestPro Ad Offers
  • MapsFrontier Advertisement Offers
  • MapsFrontier Advertisements
  • MapsFrontier Advertising
  • MapsFrontier Advertising Offers
  • MapsFrontier Promos
  • MapsPilot Ad Offers
  • MapsScout Advertising Offers
  • MapsTrek Offers
  • MapsTrek Promos
  • MapsTrek Promos
  • MapsTrek Promotions
  • MapsVoyage Ads
  • MapsVoyage Advertising
  • MapsVoyage Promotions
  • Marketing
  • Offers by MapsFrontier
  • Offers by MapsScout
  • PackageTrak Promos
  • PackageTrak Promos
  • PackageTrak Promos
  • PackTrackPlus Promos
  • PackTrackPlus Promotions
  • PackTrackPlus Promotions
  • PackTrackPlus Promotions
  • PlayPopGames Ads
  • PlayThunder Offers
  • PlayZiz Advertisements
  • ProMediaConverter Promotions
  • QuickNewsPlus Promos
  • QuizFlavor Advertising
  • QuizPremium Advertisements
  • RecipeAlly Promos
  • SuperSimpleTools Promos
  • SuperSimpleTools Promos
  • YoYoQuiz Advertisements
  • YoYoQuiz Promotions

A Banner Year

Chart showing the statistics of breaches. Education has 113 breaches, 2 million 252 thousand and 439 sensitive records exposed.

Well, it’s been a banner year. Unfortunately, the banner year is in identity theft and breaches. The number of reported breaches in Education rose from 1,257 in 2018 to 1,473 in 2019. The number of sensitive records exposed in the Education field tallies up to 3,606,114 (an increase from 1,414,624 in 2018). Non-sensitive records exposed tallies up to 22,747 (which is down slightly from 39,690 in 2018). Thus, breaches in the Education sector are mostly increasing. These are the reported breaches.

This is not surprising as more and more of our life is conducted online. More and more of our information is housed online as well.

For us, this information falls into two camps: work and home. We take security very seriously here at work. We also want to help inform you about what this means for you at home.


We have taken many steps to help promote safety and security at work. Here are just a few examples:

  • changed password requirements so that users would be encouraged to create more secure passwords
  • removed local Admin rights to computers to protect against malware installation
  • added banners on emails that come from unverified domains
  • updated settings for security issues

Please remember that many of our staff have access to important data for students and staff. It is staff responsibility and legal obligation to protect that data.

Phishing is one area where we see attempts to collect user information. We regularly block phishing attempts. However, it is up to end-users to help us identify some of these. It only takes one incident to put all of us at risk.


We’ve published tips (like “Password Management“, “Password Tips“, “Phishing Attempts Continue“, “Can You Spot the Phishing Attempt” and even a Comic to explain Phishing).

These are all still valid. Remember, it only takes a second to give up information that can compromise your security. I have a friend who basically spent two solid months of his life trying to recover from an identity thief situation.

Generally, more and more people are using their phones to conduct business and their online life. Phones are a bit unique. Our defenses tend to be at the lowest while on a phone (frequently we are doing something else, rushing to do something else, etc).


  1. Think before you Click – Remember links are how many problems start. You should always know why you are clicking a link. When in doubt, you should type the URL in the URL box yourself instead of clicking on a link.
  2. Never share your credentials – This is illegal (like Federal law illegal) while at work. It is a really bad idea everywhere.
  3. Update – Updates generally fix security issues. Do be aware of pop-ups that purport to be an update though.
  4. Password Management – Utilize strong passwords. Do NOT reuse passwords. A password manager is the best way to make that happen.
  5. Be aware of Phishing – Know the hallmarks of a phishing attempt. Be critical of requests and links that require you to sign in.
  6. Back up your Data – Back up your valuable data using the 3-2-1 method.
  7. Be wise – Do NOT fall into the “it can’t happen to me” camp. Everyone is a target. Cybercriminals don’t know their targets. Your data is probably already out there and available from one of the data breaches. Check out “Have I Been Pwned” to see if your email address was part of a breach. This will show you where and what was accessed. (*Note that 1Password now owns this site so there is a “soft” sales pitch for 1Password).

Exemplary Media Center

We are proud that our very own Salina Elementary Media Center has received exemplary status!

Ms. Cindy Alvarado was instrumental in achieving this status. It is always wonderful when our talented staff and schools are recognized externally. Keep up the great work.

Annotation Pilot

Annotation panel with "getting started" directions.

We have a wonderful opportunity to teach students to Annotate digitally. This pilot is used through iLearn. It is very simple to set up. Basically, you just add an activity in iLearn. See full instructions below:

This will create a gradable activity in iLearn. Remember that grades can be synced over to Mi-Star.

Here are a few general Hypothesis resources that might be useful to students as well:

Since this is a pilot project, there are still pieces under development. There are a few more neat features that are planned.

Phishing Attempts Continue

fishing hook with "Phishing Avoid the hook" text.

We continue to see phishing attempts. Please note that you should always look at the FULL return email address. This is especially true if an email seems oddly worded.

These phishing attempts will have some “real” information, the name of a principal, the name of the school, the phone number of the school. However, the return email address will be different.

Previously, we posted tips on avoiding phishing scams. Those tips are still good.

Some reminders (if you didn’t read above), of what you can do to help protect yourself:

  • NEVER enter your user name and password into a Google Form
  • Always look at the actual email address the email comes from
  • Hover over a link, without clicking on it, to see what the URL is (hint: is probably not a link that you want to follow.

Online Security – Part 2


‘Tis the season. I just received a notification that Pure Michigan’s account was compromised:

December 20, 2019

As most of you are aware, Wednesday, December 18th an email was sent out appearing to be from Pure Michigan / Michigan Festivals and Events regarding updating your membership information. Unfortunately our account with Constant Contact was compromised. Constant Contact recognized that it was a faux email, and quickly disabled the provided links so others were not at risk. We have taken the necessary measures to secure the account again.

While we are needing your updated information, please contact our office directly for forms.

Please accept our apology in this error.

Wishing everyone Happy Holidays

Mike Szukhent
Michigan Festivals and Events Association
President, CEO

This follows on the heels of the news that 2019 brought us at least 948 reported attacks. Oh, and 1,500 Ring passwords have been discovered to be available via the dark web (in other words, there are 1,500 known user name and password combinations from Ring available to the bad guys).

This follows the news that MysteryScience had a data breach. A couple of our users reached out to me when they received an email stating that MysterScience had been breached and telling them to reset their password. I reached out to MysteryScience to confirm that there was a breach. I also reminded people to NOT follow the link in the email. Instead, always go to the site by typing in the URL yourself. This way, if the email is legitimate, you’ll be prompted to change your password. If the email was a phishing attack, you haven’t fallen for it.

MysteryScience did finally get back to me.

So sorry for any confusion! I’m glad you’re careful and double-checking. Yes, there was indeed a data breach. If you’d like more information, you can look at this FAQ directly on our website:

You can reset your password from the link in the email we sent out to all users affected by this breach. Alternatively, you can go directly to our website at, and it will prompt you to reset your password there.

I hope this clarifies–and I’m sure glad you reached out to confirm!


All of this is a good reminder to never use the same password twice. This can be accomplished via utilizing a good password manager (which I’ve been advocating for since 2016).

Online Security

padlock through a paper contract

A couple of incidents remind us of why you should never reuse passwords.


Users have been receiving notice from MysteryScience about a breach. They are asking users to change their password.

*Reminder, do NOT click on the link in the email to change your password. Rather, go to the web site (in this case MysterScience) and use the Change password feature within the web site. This is a simple protection against phishing.

Massive Password Breach

This one doesn’t have a “cool” name, but is significant. A write up from the Infosecurity Group explains why this is so dangerous.

Billions of email addresses and plain text passwords have been leaked online by an unnamed party, putting countless internet users at risk from credential stuffing and other attacks.

In total, the database contained 2.7 billion email addresses, and plain text passwords for more than one billion of them — providing a perfect starting point for a credential stuffing campaign.

“Since many employees share passwords between their work and personal accounts, this leak not only problematic for the individuals who own the accounts, but a big risk for enterprises globally as well,”…

Mi-Star Q Mobile App

Dearborn Public Schools is pleased to announce the availability of ParentConnect (Mi-Star) as a mobile app.

You can now access ParentConnect via a mobile app.

Parent Connect Mobile App

Download the Q ParentConnection App 

(from Aequitas Solutions, Inc.)

Or you can simply search for Q ParentConnect on the App Store for your device. (The correct app was the second one listed for me). Note the icon image listed below. 

ParentConnect Application screenshot from the iTunes App store.

Open the QParentConnect App on your device.

Once the download is complete, open the App and you will need to complete the following. 

*This will only need to be completed your first-time logging in. Click on each field to view your choices.

Enter the appropriate information

ParentConnect connect screen.

Using the “picker” select the following:

  • Michigan
  • Wayne
  • Dearborn Public

Press the “Enter ParentConnection” link.

On the next page, use the “Log In” link.

Log in button highlighted on ParentConnect screen

Enter your PIN and Password:

Pin and Password Screen on ParentConnect

Review information

That’s it. Now you have access to the information in ParentConnect. Although this isn’t a complete resource, most of the popular items. 

Using the App

The App can provide lots of information. The Q ParentConnection App can also be used to report absences. 

Click on Report Absence, you can then choose to enter attendance for the whole day or only for a specific length of time, for one student or multiple students. 

Follow the prompts. (We will update with more specific information soon). 

Annotation Pilot

Annotation example

One of the skills that students need to learn is how to annotate. Not only do they need to learn how to annotate, but learning how to annotate in a digital age is important.

The Technology Department has joined an Annotation Pilot Project. This project brings the ability for all Dearborn teachers to empower students to learn annotation skills.

Teachers can now easily add the ability for students to annotate web pages or PDFs right through iLearn.

Teachers: if you’d like to try this with your students, please reach out to our Tech Coach or the Technology Department.

Follow this blog

Get every new post delivered right to your inbox.