Switch on Learning (description)

At the Windsor-Essex Catholic District School Board, we are Switching on Learning by integrating Google’s powerful ecosystem into every classroom. This blog is a dedicated space for sharing the ideas, methodologies, and digital tools that transform the modern educational experience. Our Digital Toolkit We empower educators and students by leveraging a robust, collaborative environment: Google Workspace for Education: Driving seamless collaboration through Docs, Drive, and Classroom. The Power of AI: Utilizing Gemini and integrated AI features to personalize learning and spark creativity. Data-Driven Assessment: Using MarkBook to track student growth with precision and transparency. The Process of Learning: Leveraging Revision History to emphasize growth, iteration, and the visible journey of a student's work. From interactive Chrome tools to digital storytelling, we aren't just using tech—we’re using it to bridge gaps, foster global collaboration, and future-proof our students' skills.

Phising Anyone? Some Great Tips to Protect Yourself


Phishing Anyone?  Some Great Tips to Protect Yourself


Phishing is the process of sending an email falsely claiming to be a genuine email from a legitimate, and often well-known enterprise.
For example, you may receive an email from a banking institution.  The page will look EXACTLY like the banking login page. If you look carefully at the web address the domain is different and the site is being used to collect your information.

Typically, a phishing email will imitate a popular brand, and may use their company logo for a professional and authentic design. Usually, the email will contain a link to a phishing website, which will look and feel very similar to the site it attempts to mimic. From there, you may be asked to enter personal details such as passwords and bank account numbers, which the sender can then harvest for their own illegal use.
Vishing is the telephone equivalent of phishing. Someone will call pretending to represent a legitimate business, and attempt to scam the user into handing over personal details which can then be used to perform identity theft.
Please Visit These Sites for more Information:

7 Ways to Identify and Protect Against Phishing Emails in Google Apps

How to Protect Against Phishing

No comments:

Instructional Videos for New Features: Revision History

WECDSB | Revision History Updates ↑ WECDSB Revision History Updates Short ins...