The International Schools Podcast
Education
Dan and John spend time exploring the topic of Cyber Security with Dan's work with schools and organisation and John's workshops and trainings on the topic. Dan shares his presentation on Cyber Security with thoughts, reflections and strategies on a topic that often is under the radar for educators and school leaders in International Schools.
With more options and flexibility to travel, and working remotely comes with some important steps to consider to ensure the cybersecurity of your devices and use.
2 step verification
Two-step verification is a process that involves two authentication methods performed one after the other to verify that someone or something requesting access is who or what they are declared to be.
How Two-Factor Authentication Works. (You can also use an app, but the phone is the most common method of using two-factor authentication.) Most forms of two-factor authentication ask you to sign in with your user name and password, and then enter a code that is sent to you via SMS.
Two-factor authentication:
Video
Virtual Private Networks (VPN) and your home
VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more
Surfing the web through a virtual private network ensures that your online activities are both private and secure.
VPN service is capable of keeping your private data safe from hackers, not viruses and malware. ... Well, we designed Buffered VPN to make use of 256-bit AES encryption. It's one of the most reliable encryption protocols out there. Articles
PC Magazine tested scores of VPN services, reviews and considered by PC Magazine to be the best VPN services.
Video
Anti Virus
Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your computer.
Passwords
According to the traditional advice—which is still good—a strong password: Has 15 Characters, Minimum: You need to choose a password that's long enough. ... Includes Numbers, Symbols, Capital Letters, and Lower-Case Letters: Use a mix of different types of characters to make the password harder to crack.
Smartphone security
Additional resources
John Mikton on Social Media
LinkedIn: https://www.linkedin.com/in/jmikton/
Twitter: https://twitter.com/jmikton
Web: beyonddigital.org
Dan Taylor on social media:
LinkedIn: https://www.linkedin.com/in/dantcz/
Twitter: https://twitter.com/DanTaylorAE
Web: www.appsevents.com
Listen on: iTunes / Podbean / Stitcher / Spotify / YouTube
Would you like to have a free 1 month trial of the new Google Workspace Plus (formerly G Suite Enterprise for Education)? Just fill out this form and we’ll get you set up bit.ly/GSEFE-Trial
50 - Teaching Python and coding with kids in schools with Kelly Schuster-Paredes and Sean Tibor
49 - Dr. Kristen MacConnell, Director of the Teacher Training Center Programs
48 - Carlos Davidovich - Executive & Performance Coach, Neuromanagement Expert, Speaker
47 - D. Arnie Bieber reflects on a school director’s learning journey in International Schools
46 - John Mikton talks about tech and teaching in COVID times
45 - Peter Nicholson - Social impact entrepreneur and co-founder of Baobaobooks
44 - Nancy Squicciarni - Head of Community Relations at the International School of Luxembourg
43 - A discussion of teaching in COVID times with James Sayer, Suan Yeo, Sethi De Clerq and Tim Evans
42 - James Sayer and Ken Morrison discuss ‘Student Agency In An Online Environment’
41- Review of all the current Google Certifications with Lisa Thumann
40 - Lisa Thumann hosts a panel discussion with three leading women educators on how they got started in Education Technology and became Google experts
39 - New Google Workspace for Education Features Comparison
38 - John Mikton returns to discuss tech and teaching in COVID times
37 - Review of the University of Nottingham PGCEi with Pete Clements
36 - G Suite Enterprise for Education - Teaching & learning with G Suite with Lisa Thumann
35 - G Suite Enterprise for Education - How ‘New York Public schools’ manages over 1 million students on G Suite with Clay Smith
34 - G Suite Enterprise for Education - Introduction
33 - Kim Cofino - The person behind COETAIL and Eduro Learning
32 - Why and how to become an ‘ISTE Certified Educator’?
31 - Laura White - Education Research and Digital Observation
Create your
podcast in
minutes
It is Free
Navigating Life After 40
Teaching Learning Leading K-12
Regenerative Skills
The Jordan B. Peterson Podcast
The Mel Robbins Podcast