Internet Safer Day was last week on Tuesday, February 5th. To celebrate, Google spent the entire week covering a variety of topics relating to being safe online (you can check out their series of articles here). For users who have Google accounts, one thing that you can and should do on a regular basis is perform a Security Checkup on all of your Google accounts.
Google’s Security Checkup is a three-step process where you will be asked to check on three important areas of your account safety:
Third-party access: This is the list of sites, apps, and services that have access to some of the personal information found in your account. Sources that you haven’t used in a while may no longer need access and can be removed, and if you see an entry you don’t recognize or don’t remember giving permission to access your account should most definitely have their access revoked.
Recent security events: This drop-down list will show any recent requests to connect to your account. Again, if you don’t recognize a request then your account may be at risk.
It is a good idea to perform a Security Checkup on your Google account about once a month, and if you have more than one account (e.g. a professional account for work and a personal account) then don’t forget to run the Security Checkup on each one. For other web accounts, it would be a good idea to familiarize yourself with the security options that they provide:
Device and account security are both critical components to anyone who uses technology. The past few weeks have centered around this topic with tips that covered how to keep your Chromebook secure and up-to-date. For my final post in this series, we will examine how to access and review the activity on our mail account.
Part 4: Gmail Activity Information
Many of us login to our Gmail account from multiple devices, sometimes even from “shared” devices like a computer lab terminal or shared workstation. When this does happen, do you make sure that you sign-out of your account each time? Google provides a way to examine your Gmail account activity and, more importantly, force logout of all Gmail sessions that may still be active.
Open the Gmail app
Scroll to the bottom of your window and in the bottom-right corner locate the heading “Last account activity” and click on the Details link.
Here you can review the activity displayed. If anything looks suspicious, then you can click the ‘Sign out all other web sessions’ to force sign-out of your Google account on all devices that have been used to access your mail account.
It is highly recommended that at this point you consider changing your account password to prevent any future unauthorized access.
Before closing the window, scroll down to the bottom and locate the “Alert preference” heading. By clicking the ‘change’ link, you can configure this setting to notify you if any unusual activity is detected in the future.
Device and account security are both critical components to anyone who uses technology. Starting last week, we will focus on this topic with tips that will cover how to keep your Chromebook secure and up-to-date as well as how to make sure your account and private information are safe.
Part 2: Chromebook Updates
Chromebook updates help protect your device from viruses and malware, and give you access to important updates and new features inside of the G Suite list of apps.
Your Chromebook is set to check for updates automatically and download them in the background. However, to install an update the Chromebook does require your help by rebooting the device.
When an update is ready to install, the Chromebook will notify you by displaying a vertical arrow in the bottom-right corner of the screen near the clock display.
Click the arrow to access the ‘Restart to update’ prompt. This will close all windows, tabs, and applications you have running.
Check for updates yourself
Open Chromebook Settings
At the top of the Settings window, click on the ‘About Chrome OS’ link
From the ‘About’ window, your Chromebook will display the current version installed.
Click the “Check for and apply updates” to manually start the update process.
When the download is complete, a restart of the device will complete the update process.
A couple of weeks ago I was setting up for a professional development session and for some reason I was unable to get my Chromebook to mirror its screen on the classroom display. Well, it sort of did in that I could see and control my cursor, but with pitch black being my only background color. I tried what felt like everything on both the Chromebook and the presentation equipment with no luck. Then, just for fun I did a manual check for updates on the Chromebook and lo and behold there was one. And you know what happened next, right? Yeah, the update fixed the mirroring problem…go figure.
Device and account security are both critical components to anyone who uses technology. The next few weeks will center around this topic with tips that will cover how to keep your Chromebook secure and up-to-date as well as how to make sure your account and private information are also safe.
Part 1: The Lock Screen
The lock screen will secure access to your device and the data within any of your open applications without having to shut your device down.
Option #1: Keyboard shortcut:
Lock the screen at a moment’s notice
Unlock your screen by entering your GSuite password
Option #2: Require password to wake from sleep:
Lock the screen automatically when you close the Chromebook lid
When lid is opened, you will be prompted to enter your GSuite password to continue
To setup, go to Settings -> People -> Check of the box (see image below)
This security works best when you use a password that is strong (i.e. a mixture of capitals, numbers, and symbols) and that you do not share it with anyone else.
On one side you have a ginormous reservoir of digital media that many educators have gone to support and enhance their lessons.
On the other you have the those suggested/related videos that display at the end of the video, and some use the term “related” very loosely.
But, thanks to a recent posting on Google+ from Tony Vincent over at Learning in Hand, I learned that there is a way to disable the related videos from showing at the end when you go to embed a YouTube video:
Scroll down beneath the YouTube video and click on the ‘Share’ button.
Click on the ‘Embed’ option to reveal the embed code for the video.
Click on the SHOW MORE link located just below the embed code box.
The window will expand to show a preview of the video an additional customization options such as video size and player controls. The first checkbox is the one you want which is enabled by default: “Show suggested videos when the video finishes.” Uncheck this box to disable the suggested/related videos panels from being displayed at the end of the YouTube video.
Copy-&-paste the revised embed code and add it to your project.
If you’d like to share a YouTube video without any of the distractions found on their site, then you should check out the site ViewPure.com
Ducksters is a safe, educational research site designed with students in mind. The site is pretty basic without a lot of flash and fanfare so students can focus more on the content they are consuming. There are no ads on the site.
To get started:
Choose from one of the five content category buttons at the top of the site.
Choose a more specific topic from the available links in the center square of the site.
Use the Search box in the top-right corner if you have a specific topic in mind. Note that while the search results may look like a standard Google Search they are in fact a custom search that shows results only from Ducksters.com
This tutorial will show how to perform a security check-up on your Google Apps account. This checkup will ask you to examine the recent activity on your account, then approve a listing of devices and 3rd party apps that have been given access to your account and what types of information they are using.
This tutorial will show how to access a details screen with information on when and from what type of device(s) your Google Apps account has been recently accessed. We will then show how to remotely disconnect any additional sessions that have access to your account.
In today’s age where we are constantly flooded with requests from apps and/or social networking services for access to our personal information, it is important to know who has access to what. You have the right to determine what information an app/service can have access to and can change you mind at any time. It is also important to know if any “unwelcomed” guests have successfully gained access to your online information.
This tutorial will show how to manage the list of 3rd party apps, extensions, and devices that have access to some or all of your Google Apps information.
In a recent blog post by FreeTech4Teachers.com, Richard Byrne talks about the stereotype surrounding the “Private” or “Incognito” mode found in most web browser applications; that users only use this tool when they have something to hide. And while this is indeed one way that private browsing can be used, it is not the only way.
Another use is to access a website that you are currently logged in to as both the teacher/manager and as a student/visitor. Using the private browsing mode, you can view a website from two different perspectives without having to log in and out of your account or use two different browser applications. As Richard Byrne points out, this avoids a great deal of hassle for him when he is providing professional development and would like to demonstrate a website, service, or tool from both the teachers’ perspective and that of the student. Teachers could use this to verify that the content they have posted online will look correct when accessed by students in class, or that content intended to be viewable only by one class session is not accessible by another.
Using the private/incognito mode can also be helpful when a student needs to access information on the teachers’ laptop, which is connected to some sort of presentation system (i.e. an interactive whiteboard). Instead of the teacher logging out of their account so that the student can login to access their work, teachers can open a new private/incognito window for the student to use. This allows the teacher to remain logged in to their web services while the student logs in to theirs. When the private/incognito tab is closed then that user is automatically logged out, thereby maintaining the security of their account and the information contained within.