Quit wasting time and get started using a tool that is designed for teaching and learning by people passionate about education! iLearn is built for classroom activities. We now offer pdf and web page annotation, secured and shareable assessments, writing peer review workshops with rubrics, interactive H5P activities, and so much more!
ONE CLICK LOGIN
Log in with your Google Account Utilize Google Single Sign-on so that your students can access learning materials quickly.
SECURE BROWSER APP
Stop cheating before it happens The iLearn Secure Browser App prevents cheating by locking down Chromebooks.
MISTAR GRADE EXPORT
Publish grades directly to MISTAR Save time and be more efficient. Let iLearn grade your assessments and with the click of a button transfer grades to MISTAR.
Good news! The Technology Department has now embedded more standards into DEC. These are all linked. This way, if you use the Standard Short Code in a lesson, explanation or reference, it will be linked automatically.
Plus, all of the standards are searchable. You can click on a Standard Resource and search within it. In the example below, I searched for “upper case” (note that I did NOT use quotation marks in the search though – using quotation marks would not return any results since those words are not next to each other). This returns three standards that deal with “upper case” (even though there are words between “upper” and “case”) and gives me the standards.
We’ve been working for quite a while on a special project. We are now ready to unveil that project.
We understand the struggle with signing into different places. We want to make this as easy as possible, AND as secure as possible. Those things are generally two different ends of the teeter-totter. That is, the easier something is to access, the less secure it is.
Kindergarteners face a special challenge. Since they are frequently still learning their letters and numbers, signing in to a computer securely can be a conundrum. We’ve developed badges to help that process out. That can get them signed into a Chromebook easily, but not iLearn.
We now have an answer.
Students (and Staff) can now sign in using Google. This reduces the load for elementary students. As it turns out, this is good for everyone. We were able to accomplish this while still protecting the security of our data.
Now, IF you are signed into Google, signing into iLearn only requires a button click – no more entering a user name and password. (We have also implemented this on MyPD.)
That’s right. If students are on a Chromebook, they are already signed in. So, when they click the Google button at the bottom of the login page, they will be automatically (and quickly) signed into iLearn.
With the holidays fast approaching, a rise in phishing attacks is traditionally seen as well. Phishing attacks can be frustrating to deal with. The best defense is to not fall for them in the first place. Unfortunately, we are seeing phishing attacks because “better” (i.e. harder to detect) and more polished.
What Phishing Does
Phishing is an attempt to do one of two things
Tricking users into revealing their credentials.
Getting users to install malware.
Quite frankly, your credentials are very valuable. For many of our users, district credentials lead to student information, lots of valuable district information and more. Plus, many users “reuse” passwords. So, learning a user name and password on one site can lead to the ability to log into other sites.
Protecting Against Phishing
We employ several strategies to prevent phishing attempts from ever reaching our users. However, even the best of all of these combined will not be perfect. Occasionally, phishing attempts will land in your inbox.
Tips to Identify Phishing Attempts
Be suspicious of “odd” grammar and punctuation
Be suspicious of “odd” wording
You probably didn’t “win” a gift card (especially if you never entered a contest)
Be wise about contests
Be aware of “urgent” deadlines
Watch out for shortened URL’s
Look at where the link is actually taking you
Carefully review the actual URL of the site that you are on
Spear phishing is targeted at specific individuals. Unlike phishing (which usually blankets a wide variety of users), spear phishing aims to trick high profile targets into giving up their credentials.
Preventing Becoming a Victim
It is important to prevent becoming a victim.
Use the Tips to Identify above.
Turn on 2-Step or 2-Factor Authentication.
Use a Password Manager.
Be suspicious (especially when on a mobile device).
Instead of clicking on a link, enter the URL of a website that you want to visit (or use a known bookmark)
We are aware that Agile Minds is currently experiencing some issues with the recent Chrome update. They are working on the issue.
Chromebook users should expand the viewer’s header and choose a page within the header rather than in the navigation bar. If taking a quiz, remember that you can use the left and right arrows to move from page to page.
One of the things that we take very seriously is security. The safety and security of our users and data are important. This responsibility is not just for the Technology Department but is the responsibility of every user. Some times, people do what is expedient, instead of what is safe. One example that we had this year was a teacher signing into a computer and then letting a substitute use that computer. Unfortunately, the substitute made some poor decisions. (Just a reminder to NEVER share your credentials with someone else or sign into a computer and let someone else use it. This can lead to many uncomfortable situations. It’s also against federal law).
Because we take security seriously, we frequently have to ask questions and seek clarification about accounts and access. Recently, I had someone ask why I cared, and what were the possibilities of a compromise (frequently called a “hack”, but hacking is more specific than a compromise) of our data.
*Note that these are only the reported compromises.
Compromises occur due to a wide range of conditions that include, but are not limited to:
a misconfiguration on a server
an employee giving out their credentials
a contractor who copies information
malware installed by a user
ransomware installed by a user
email phishing that was successful
These compromises happen to all different sizes of districts and background. While the districts vary greatly in terms of size, socio-economic status, funding and more, the impact is similar for all.
…the impact of publicly-reported K-12 cyber incidents is significant. During 2018, such incidents resulted in the theft of millions of tax payer dollars, stolen identities, tax fraud, altered school records, website and social media defacement, and the loss of access to school technology and IT systems for weeks or longer.
Recently, several other governmental agencies have been successfully compromised. The cost of recovering from those compromises can be expensive in terms of actual dollars, time to recover and lost data.