Category Archives: Latest

ISTE Travel Scholarships

In June, 22 ECMECC educators traveled to Philadelphia and attended the 2019 International Society of Technology in Education (ISTE) conference.  While attending, they were able to choose from over 1,900 sessions, visit with over 500 educational vendors, and network with about 20,000 enthusiastic educators.

We also attended many Special Interest Groups, Play grounds, and Poster sessions as well as a few social gatherings. Attending ISTE has been a career altering activity for many educators including some from ECMECC.

Within our group, half attended on a scholarship awarded by ECMECC which covered the cost of travel and hotel accommodation.  Scholarship applications are currently open and will close on November 1st

at 10:00pm. Each applicant must complete a short google form, submit a letter of support from an administrator and produce a short video highlighting how technology use has transformed your teaching practice.  If chosen, you will meet several times before the June departure to become acquainted with the other recipients and prepare for the 4 days FILLED with learning and excitement. After returning you will present at Lake ECMECC sharing something you have learned from the trip. All Excellent ECMECC Educators are encouraged to apply for Anaheim ISTE 2020 June 28-July 1!  More information is available at HERE

What Is PII,  Why Should It Be Protected and Four Tips/Tricks to Protect Yours

Category : Cybersecurity , Latest

PII stands for Personally Identifiable Information and covers any information that could be used maliciously to identify or locate you. This can include things like your name, address, birthday, Social Security number, phone number or any other information that could be used to identify you.

PII should be kept safe because this information can be used for malicious intentions such as identity theft or fraud. Thieves will seek out as much information about their target as possible. For this reason you should be leary about providing any personal information, especially if it is unclear why it is needed. Here are some tips and tricks about how to protect your PII

Lock down your social media accounts
Do you share pictures and other information on social media? Do you have accounts on any social media platform? If so then you should make sure all of your information is private and you only are friends with people you know and trust. Think about what is potentially available on social media profiles: birthday, relationship status, employment information, location, schooling, and much more. To protect your accounts make sure you have two-factor enabled to make it more difficult for anyone to gain access to your account; make sure you use a unique and complex password; check your privacy settings to make sure your information is not public; resist the urge to share sensitive information online.


Use caution on public Wi-Fi
When traveling or out an about be careful how you use public Wi-Fi. Criminals can setup “free” Wi-Fi with the intentions of gathering PII. To protect yourself, do not check any bank accounts or log into any other accounts that could be at risk while on a public connection. Research a VPN (virtual private network) solution that protects your privacy and will encrypt your traffic on public connections. Don’t set your device up to remember connections and/or make sure to forget any connections when you are done.

Protect Security Questions
You’ve seen those surveys that traverse the web; what is the name of your first pet, where did you graduate, who was your favorite teacher, share a memory about me. Do any of these things sound familiar? Possibly a security question? No matter how fun they seem do not participate in these surveys. That information can then be used to answer some of your security questions. A tip is to create bogus answers these questions and store them in a password manager.  For example: The security question for your banking account can be something like What is the name of your first pet? I don’t want to use my actual answer because people know that. Instead I’m going to let my password manager generate a response and I will store that in the manager and use that going forward.

Be aware of how your information is being used
Read Terms and Conditions when signing up for new services. When being asked for personal information make sure to only provide information you are comfortable with the requestor having. Do not be afraid to ask why they need to know that. Some places ask for Social Security Numbers when they may not need them. Don’t write information such as credit card and banking account numbers on paper forms.

What is Phishing? Why should I care?

Category : Cybersecurity , Latest

Phishing can be broadly labeled as an act where someone is targeted by someone else who is posing to be legitimate to gain confidential or sensitive information. There are other terms that are thrown out there when talking about phishing such as vishing, whaling, pharming, smishing and probably others!

What do these different terms mean?

  • Vishing – V for voice; think of it as voice phishing. These attacks come in the for of a phone call.
    Example: A call from someone stating they are your bank. They’ve detected fraudulent behavior on your account and they need to verify your identity by having you provide your debit card pin number.
    How to handle: Tell the caller that you will call in and call a back with a reputable customer service number (the back of your debit or credit card should have a valid number). NEVER give sensitive information over the phone if a call was not initiated by you.
  • Whaling – whaling attacks typically target high-profile employees like a Superintendent, Finance or Accounting employees. The goal of this type of attack it to get to someone who has the ability to authorize or process high value transactions.
    Example: An email comes through stating it’s from your Superintendent asking you to wire a large sum to a specific account or to provide employee payroll information
    How to handle: check the from address. Typically attackers will spell something wrong or use a different but similar domain name. Pick up the phone and call the person the emails is from to verify.
  • Pharming – This attack is where a scammer installs malicious code to force your device to go to a fraudulent website instead of the legitimate one.
    Example: you go to your banking website but the logo looks a little different and the login area has changed
    How to handle: make sure you are using an antivirus product and that you keep it up-to-date. Make sure you install any operating system updates. Lastly, if a site looks off do not proceed. Verify the changes. Ask a friend to check the site or check the site on a different device. If there are noticeable differences use your antivirus software to do a scan and proceed from there.
  • Smishing – S for SMS; this is SMS or Text Message Phishing. In this attack the attacker sends you suspicious text message that may ask you to install an application or click on a link and provide information.
    Example: You get a text message that states “You have been randomly selected to receive a $1000 pre-paid Visa gift card! Click this link to redeem your prize!”
    How to Handle: Notice that this is “too good to be true” and ignore the message. Delete it. Never click a link where you do not know the sender and expect the message.

Tips and Tricks to Spot a Phish

  • Hover over all links and make sure they are legitimate checking for misspellings, transpositions and extra characters
  • Do not trust emails, phone calls or text messages from unknown or unvalidated senders
  • If something seems off about a website trust your instincts and verify that the site is legitimate
  • Protect your personal information including but not limited to: username, password, baking information, employment information
  • Make sure anyone requesting information is who they say they are by verifying their identity in a different form from the request. Example a call from an unknown number saying they are with your security company; call the security company at the number you have and ask if they called
  • Don’t open attachments from sources you do not trust and use caution opening attachments from trusted senders

Are you ready to test your knowledge? Go to to see if you can spot the phish!

Facebook Hoaxes and Security Risks

Category : Cybersecurity , Latest

As our world becomes more intertwined in social media we need to be cautious with our profiles. Friends and acquaintances may post things about how to show friends you haven’t seen for years or notify you that they got a friend request from another profile appearing to be you. What do you do? How do you verify this stuff? Should you verify it?

Yes; verify, verify, verify!

One circulating Facebook is the posts about how to bypass the system to show posts from friends you haven’t seen in years. Following this does not change anything. Here is an example of some of the wording seen.

Facebook Security Hoax Example

Viral messages about your account being cloned have also been making the rounds for some time. Friends will message you or post on your wall that they’ve received a duplicate friend request from you. What should you do? Do not forward the message. Delete and ignore. If you are concerned that your account was cloned, search for the other versions of your account and then report any you’ve found to the site.

Facebook Message about a security item

Popular surveys or quizzes making the rounds can make your online accounts susceptible to risks. Think about this… You create an online account at your bank. They prompt you to create and/or answer 3 questions in case you forget your password. You pick 1) What’s your mother’s maiden name? 2) What’s your favorite color? 3) Make and Model of your first car.

Then you fill out one of the quizzes. You just identified answers to your security questions! Someone with malicious intentions could take this information and potentially obtain access to your account.

Facebook Personal Questions

Facebook Personal Questions

At the end of the day your security and the security of your friends and family should take priority. Think before you post. Is this information true? Does providing this information to the public put me at risk? And remember no matter how locked down your profile is, it is still on the internet which means it can be made public.

Verify information if you are not sure. Sometimes verifying from multiple news sources is needed.

Here are some good resources for verifying sources of information:


Area Schools to receive USDA DLT Grant

Grant will improve distance learning opportunities

East Central Minnesota Educational Cable Cooperative (ECMECC) along with its partners at the Southwest West Central Service Cooperative (SWWC) and three school districts in the Northwest Links (NWLinks) region are pleased to announced they have been awarded $249,027 in the “Distance Learning and Telemedicine Grant Program” administered by the USDA and the Rural Utilities Service. This Rural Development investment will be used to purchase and install interactive video distance learning telecommunications equipment. ECMECC and their partners will provide critically needed learning opportunities focused on workforce readiness, world language and college credit courses to secondary students in 12 rural East Central Minnesota school districts, 13 rural districts in Southwest Minnesota and three rural districts in Northwest Minnesota. Additionally, students in 37 elementary, middle and high schools through Southwest Minnesota will have access to video technology to provide experiential learning, student support services and other collaborative activities benefitting 125,355 people at all locations.

Professional Development Scholarships for Teachers!

PD Scholarships available for CTE and college credit teachers

ECMECC is pleased to announce the availability of up to 50 scholarships, up to $500 each to support professional development activities for licensed staff in ECMECC full member districts who currently teach concurrent enrollment, college-in-the-schools, AP or career & technical education course/s. The scholarships may be used to pay expenses to attend relevant conferences, workshops, or other professional learning activities.

Learn more and apply HERE!