ISTE Travel Scholarships

In June, 22 ECMECC educators traveled to Philadelphia and attended the 2019 International Society of Technology in Education (ISTE) conference.  While attending, they were able to choose from over 1,900 sessions, visit with over 500 educational vendors, and network with about 20,000 enthusiastic educators.

We also attended many Special Interest Groups, Play grounds, and Poster sessions as well as a few social gatherings. Attending ISTE has been a career altering activity for many educators including some from ECMECC.

Within our group, half attended on a scholarship awarded by ECMECC which covered the cost of travel and hotel accommodation.  Scholarship applications are currently open and will close on November 1st

at 10:00pm. Each applicant must complete a short google form, submit a letter of support from an administrator and produce a short video highlighting how technology use has transformed your teaching practice.  If chosen, you will meet several times before the June departure to become acquainted with the other recipients and prepare for the 4 days FILLED with learning and excitement. After returning you will present at Lake ECMECC sharing something you have learned from the trip. All Excellent ECMECC Educators are encouraged to apply for Anaheim ISTE 2020 June 28-July 1!  More information is available at HERE

What Is PII,  Why Should It Be Protected and Four Tips/Tricks to Protect Yours

Category : Cybersecurity , Latest

PII stands for Personally Identifiable Information and covers any information that could be used maliciously to identify or locate you. This can include things like your name, address, birthday, Social Security number, phone number or any other information that could be used to identify you.

PII should be kept safe because this information can be used for malicious intentions such as identity theft or fraud. Thieves will seek out as much information about their target as possible. For this reason you should be leary about providing any personal information, especially if it is unclear why it is needed. Here are some tips and tricks about how to protect your PII

Lock down your social media accounts
Do you share pictures and other information on social media? Do you have accounts on any social media platform? If so then you should make sure all of your information is private and you only are friends with people you know and trust. Think about what is potentially available on social media profiles: birthday, relationship status, employment information, location, schooling, and much more. To protect your accounts make sure you have two-factor enabled to make it more difficult for anyone to gain access to your account; make sure you use a unique and complex password; check your privacy settings to make sure your information is not public; resist the urge to share sensitive information online.


Use caution on public Wi-Fi
When traveling or out an about be careful how you use public Wi-Fi. Criminals can setup “free” Wi-Fi with the intentions of gathering PII. To protect yourself, do not check any bank accounts or log into any other accounts that could be at risk while on a public connection. Research a VPN (virtual private network) solution that protects your privacy and will encrypt your traffic on public connections. Don’t set your device up to remember connections and/or make sure to forget any connections when you are done.

Protect Security Questions
You’ve seen those surveys that traverse the web; what is the name of your first pet, where did you graduate, who was your favorite teacher, share a memory about me. Do any of these things sound familiar? Possibly a security question? No matter how fun they seem do not participate in these surveys. That information can then be used to answer some of your security questions. A tip is to create bogus answers these questions and store them in a password manager.  For example: The security question for your banking account can be something like What is the name of your first pet? I don’t want to use my actual answer because people know that. Instead I’m going to let my password manager generate a response and I will store that in the manager and use that going forward.

Be aware of how your information is being used
Read Terms and Conditions when signing up for new services. When being asked for personal information make sure to only provide information you are comfortable with the requestor having. Do not be afraid to ask why they need to know that. Some places ask for Social Security Numbers when they may not need them. Don’t write information such as credit card and banking account numbers on paper forms.

What is Phishing? Why should I care?

Category : Cybersecurity , Latest

Phishing can be broadly labeled as an act where someone is targeted by someone else who is posing to be legitimate to gain confidential or sensitive information. There are other terms that are thrown out there when talking about phishing such as vishing, whaling, pharming, smishing and probably others!

What do these different terms mean?

  • Vishing – V for voice; think of it as voice phishing. These attacks come in the for of a phone call.
    Example: A call from someone stating they are your bank. They’ve detected fraudulent behavior on your account and they need to verify your identity by having you provide your debit card pin number.
    How to handle: Tell the caller that you will call in and call a back with a reputable customer service number (the back of your debit or credit card should have a valid number). NEVER give sensitive information over the phone if a call was not initiated by you.
  • Whaling – whaling attacks typically target high-profile employees like a Superintendent, Finance or Accounting employees. The goal of this type of attack it to get to someone who has the ability to authorize or process high value transactions.
    Example: An email comes through stating it’s from your Superintendent asking you to wire a large sum to a specific account or to provide employee payroll information
    How to handle: check the from address. Typically attackers will spell something wrong or use a different but similar domain name. Pick up the phone and call the person the emails is from to verify.
  • Pharming – This attack is where a scammer installs malicious code to force your device to go to a fraudulent website instead of the legitimate one.
    Example: you go to your banking website but the logo looks a little different and the login area has changed
    How to handle: make sure you are using an antivirus product and that you keep it up-to-date. Make sure you install any operating system updates. Lastly, if a site looks off do not proceed. Verify the changes. Ask a friend to check the site or check the site on a different device. If there are noticeable differences use your antivirus software to do a scan and proceed from there.
  • Smishing – S for SMS; this is SMS or Text Message Phishing. In this attack the attacker sends you suspicious text message that may ask you to install an application or click on a link and provide information.
    Example: You get a text message that states “You have been randomly selected to receive a $1000 pre-paid Visa gift card! Click this link to redeem your prize!”
    How to Handle: Notice that this is “too good to be true” and ignore the message. Delete it. Never click a link where you do not know the sender and expect the message.

Tips and Tricks to Spot a Phish

  • Hover over all links and make sure they are legitimate checking for misspellings, transpositions and extra characters
  • Do not trust emails, phone calls or text messages from unknown or unvalidated senders
  • If something seems off about a website trust your instincts and verify that the site is legitimate
  • Protect your personal information including but not limited to: username, password, baking information, employment information
  • Make sure anyone requesting information is who they say they are by verifying their identity in a different form from the request. Example a call from an unknown number saying they are with your security company; call the security company at the number you have and ask if they called
  • Don’t open attachments from sources you do not trust and use caution opening attachments from trusted senders

Are you ready to test your knowledge? Go to to see if you can spot the phish!

Facebook Hoaxes and Security Risks

Category : Cybersecurity , Latest

As our world becomes more intertwined in social media we need to be cautious with our profiles. Friends and acquaintances may post things about how to show friends you haven’t seen for years or notify you that they got a friend request from another profile appearing to be you. What do you do? How do you verify this stuff? Should you verify it?

Yes; verify, verify, verify!

One circulating Facebook is the posts about how to bypass the system to show posts from friends you haven’t seen in years. Following this does not change anything. Here is an example of some of the wording seen.

Facebook Security Hoax Example

Viral messages about your account being cloned have also been making the rounds for some time. Friends will message you or post on your wall that they’ve received a duplicate friend request from you. What should you do? Do not forward the message. Delete and ignore. If you are concerned that your account was cloned, search for the other versions of your account and then report any you’ve found to the site.

Facebook Message about a security item

Popular surveys or quizzes making the rounds can make your online accounts susceptible to risks. Think about this… You create an online account at your bank. They prompt you to create and/or answer 3 questions in case you forget your password. You pick 1) What’s your mother’s maiden name? 2) What’s your favorite color? 3) Make and Model of your first car.

Then you fill out one of the quizzes. You just identified answers to your security questions! Someone with malicious intentions could take this information and potentially obtain access to your account.

Facebook Personal Questions

Facebook Personal Questions

At the end of the day your security and the security of your friends and family should take priority. Think before you post. Is this information true? Does providing this information to the public put me at risk? And remember no matter how locked down your profile is, it is still on the internet which means it can be made public.

Verify information if you are not sure. Sometimes verifying from multiple news sources is needed.

Here are some good resources for verifying sources of information:


ISTE 2019 Scholarship Recipients Announced

Teacher Professional Development Scholarships Awarded for 2019

After careful review and a difficult selection process, ECMECC is pleased to announce the 10 individuals, out of 18 applicants, to receive a scholarship to travel to the ISTE 2019 Conference in Philadelphia June 22-26th 2019. ECMECC will cover the total cost of transportation and hotel. Along with the application form, applicants were required to submit a short, dynamic video teaching a tech-related lesson.

ISTE, International Society of Technology in Education, is the largest conference for classroom technology integration in the nation. The conference includes four full days brimming with interactive, inspirational and highly relevant professional learning opportunities; three powerful keynote presentations on big ideas from the field of education and beyond; your choice of hundreds of sessions in a variety of formats, including lectures, BYODs, and hands-on learning environments; access to a massive Expo Hall featuring the latest ed tech products and services from more than 500 companies and 1,400 industry reps: and unlimited networking opportunities with nearly 21,000 educators, educator leaders and corporate representatives from around the world.

Scholarship recipients will be asked to share their experience with their home district, take part in a panel discussion at the Lake ECMECC Conference and also present a session at Lake ECMECC on a topic that they were inspired by at ISTE.

Congratulations to the following recipients and districts:
Bryan Johnson – Braham
Whitney Anderson – Chisago Lakes
Maggie Stellmach – Milaca
Katelyn Vickers – Mora
Sherri Keller – North Branch
Juli Cooley – North Branch
Dihanna Fedder – Pine City
Erin Franson – Princeton
Nicole Cook – Princeton
Eric Telander – Rush City

Congratulations to all recipients!

Area Schools to receive USDA DLT Grant

Grant will improve distance learning opportunities

East Central Minnesota Educational Cable Cooperative (ECMECC) along with its partners at the Southwest West Central Service Cooperative (SWWC) and three school districts in the Northwest Links (NWLinks) region are pleased to announced they have been awarded $249,027 in the “Distance Learning and Telemedicine Grant Program” administered by the USDA and the Rural Utilities Service. This Rural Development investment will be used to purchase and install interactive video distance learning telecommunications equipment. ECMECC and their partners will provide critically needed learning opportunities focused on workforce readiness, world language and college credit courses to secondary students in 12 rural East Central Minnesota school districts, 13 rural districts in Southwest Minnesota and three rural districts in Northwest Minnesota. Additionally, students in 37 elementary, middle and high schools through Southwest Minnesota will have access to video technology to provide experiential learning, student support services and other collaborative activities benefitting 125,355 people at all locations.

School Security Summit – December 6th, 2018

Join us for our 2018 School Security Summit Thursday December 6th, 2018 at the Braham Event Center in Braham, MN from 9:00am to 2:30pm. Interested administrators, facilities personnel, technology staff, school resource officers, law enforcement personnel and others involved in school safety are welcome to attend. This is a FREE event for ECMECC full member districts and ANY law enforcement personnel. Attendance is only $25 per person for associate and non-member district staff. Continental breakfast and Lunch is included for everyone who attends.

Our opening speaker will be Randy Johnson from the MN School Safety Center, part of Homeland Security and the MN Dept. of Public Safety.

Learn more at:

Register at:

Professional Development Scholarships for Teachers!

PD Scholarships available for CTE and college credit teachers

ECMECC is pleased to announce the availability of up to 50 scholarships, up to $500 each to support professional development activities for licensed staff in ECMECC full member districts who currently teach concurrent enrollment, college-in-the-schools, AP or career & technical education course/s. The scholarships may be used to pay expenses to attend relevant conferences, workshops, or other professional learning activities.

Learn more and apply HERE!

National Cyber Security Awareness Month

Category : Cybersecurity

What is National Cybersecurity Awareness Month (NCSAM)? A collaborative effort between federal and industry leaders to make sure all Americans have the resources needed to stay safe and more secure online. The National Cybersecurity Division within the Department of Homeland security has been observing NCSAM since 2004 with the goal to provide everyone with tips and best practices on how to stay safe online. For October 2018, here are the weekly themes with some tips and tricks that apply:

Week 1: October 1-5: Make Your Home a Haven for Online Safety

  • Basic cybersecurity essentials the whole family can deploy!
  • Back it Up → Protect your valuable work, music, photos and other digital information by making an electronic copy and storing it safely.
  • Keep a Clean Machine → Having the latest security software, web browser and operating system is the best defense against viruses, malware and other online threats. Make sure you keep all connected things updated including phones and other smart devices.
  • Lock Down Your Login → Usernames and passwords are not enough to protect key accounts like email, bank and social media. Improve account security by enabling strong authentication tools such as biometrics or unique one-time codes (2-factor authentication).
  • Personal Information is Like Money. Value it. Protect it. → Info about you, such as your purchase history or location, has value. Be thoughtful about who gets that info and how it’s collected through devices, apps and websites that you use.
  • Secure Your WiFi Router → Set a strong passphrase (at least 12 characters long) for your Wi-Fi network. Keep it positive and easy to remember like “ILoveCyberSecurity!!”
  • Share with Care → Think before posting about yourself and others online. Consider what a post reveals, who might see it and how it might affect you and others now and in the future.

Week 2: October 8-12: Millions of Rewarding Jobs: Educating for a Career in Cybersecurity

  • CyberPatriot helps to inspire young minds towards careers in cybersecurity. Read more:
  • NCSA’s Parent Primer for Guiding Kids to careers in cybersecurity is a free resource that you can use at home, school and in your community!
  • DHSgov’s Scholarship for Service program can help students on a path towards a cybersecurity career career. Learn more →

Week 3: October 15-19: It’s Everyone’s Job to Ensure Online Safety at Work

  • STEP 1 to better securing your business → Learn how to identify your digital “crown jewels.”
  • STEP 2 to better securing your business → Build your cyber defenses around your businesses’ critical assets and systems.
  • STEP 3 to better securing your business → Know when something has gone wrong. The more quickly you know about an incident, the more quickly you can mitigate the impact
  • STEP 4 to better securing your business → Make and practice an incident response plan to contain an attack or incident and maintain business operations in the short term.
  • STEP 5 to better securing your business → Recover from the immediate aftermath of a cyber incident and build out your cybersecurity posture to help prevent future incidents.

Week 4: October 22-26: Safeguarding the Nation’s Critical Infrastructure

  • Turn on multi-factor authentication on at least one online account. Learn how →
  • When in doubt, throw it out: Links in emails, posts and ads are often how criminals try to steal info and gain access into critical systems. Learn More →
  • November is Critical Infrastructure Security & Resilience Month! Learn about how you can keep these systems more secure. →
  • Turn on automatic updates for your key devices. Having the latest security software can help better protect you from online threats and keep our Nation’s critical systems more secure. Get more tips →