A place for faculty, staff, parents and students of Bishop Kelly High School to come, find answers, or share information about all things technology.
Operating as usual
Dear Parents and Staff,
Bishop Kelly has experienced a phishing attack that was partially successful. From somewhere outside of the organization a series of e-mails were received (this may be a Google Apps for Education issue). Unfortunately, this scam partially accomplished it's goal here at BK. This means some of you may receive, or have already received an e-mail from someone you know with a subject line stating, "(the senders name) has shared a document on Google Docs with you."
The clue that this is not a legitimate e-mail is that the recipient is: [email protected], and you are the BCC recipient.
Should you get an e-mail like this do not open it and delete it immediately!
Since this appears to be a much broader issue, these e-mails could come from any school or related institution.
Please feel free to e-mail us with any questions.
Another Great Reason To Buy a Tesla https://www.youtube.com/watch?v=bn1uzAJk-6o
No more parking tickets for Model S owners. Today we’re introducing: ticket-avoidance-mode. Watch how it works.
msn.com Tech news sites like PC Mag and even the BBC are reporting that, in Germany, the My Friend Cayla dolls are basically illegal. And that they put any child at risk for have his or her privacy invaded, since hackers can use an unsecure bluetooth device that is embedded in the toy "to listen and talk to...
blog.knowbe4.com Scam Of The Week: Valentine’s Day Phishing Attacks
blog.knowbe4.com CyberheistNews Vol 7 #5 Ransomware Infection Causes Loss of 8 Years of Police Department Evidence
Another way for the bad guys to get ransomware on your computer. Using something called "ransomware as a service" anyone can add it to a file on a thumb drive. When the file is clicked, the ransomware will be loaded onto your computer! Don't put that USB drive you just found into your computer! If you would like ideas of how to protect yourself, reply to this message.
blog.knowbe4.com [ALERT] USB Sticks Could Infect Your Network With New Spora Ransomware Worm
blog.knowbe4.com Scam Of The Week: IRS Issues Warning On New Tax Phishing Attack
Alright, anyone with a Yahoo account needs to close the account, even if it is unused!
blog.knowbe4.com And Another One Billion More Yahoo Accounts Hacked. Watch out for phishing attacks.
One more reason to close your Yahoo account. Yikes!
komando.com This is bad news for Yahoo. The company is still trying to recover from a massive data breach that exposed around 500 million Yahoo customers. But now it looks like there are more ...
Number 5 is particularly interesting. It is a whole new thing to think about. All the others have been said before.
This is going to become more and more common. Make sure you verify what you are downloading and where you are downloading it from.
arstechnica.com 86 apps available in third-party marketplaces can root 74 percent of Android phones.
Check it out and share. Get them some recognition! https://www.youtube.com/channel/UCH7yRFy-kQh_KquNMSfdKYQ?view_as=public
youtube.com The BK Spotlight page has been remodeled to be the outlet for the BK Video Production class. Please subscribe to see what videos our students have put togeth...
Some more information...
nytimes.com Hundreds of rogue apps, most of which came from developers in China, have managed to slip through Apple’s review process.
Watch out! Protect your phones! After all they are nothing but little computers.
blog.knowbe4.com Scam Of The Week: Watch Out For Fake Apps
blog.knowbe4.com New Locky Ransomware Phishing Attack: Credit Card Suspended And Suspicious Money Movements
If you have the free version of Spotify the ads that run can deliver malware. Be careful not to click on them, or uninstall the app.
myce.com The free version of the popular music streaming site, Spotify, showed malicious advertisements to its users. According to reports the Spotify Free app will launch the default browser and open several websites serving malware.
The largest publicly disclosed breach of user information. If any of you have a yahoo account, and have not already changed your password, make sure that you do so.
community.spiceworks.com It's all over the press. Here is a quote from Reuters: "Yahoo Inc said on Thursday information associated with at least 50... | 9 replies | General IT Security
[09/13/16] It is not enough to be passersby on the digital highways, simply “connected”; connections need to grow into true encounters. We cannot live apart, closed in on ourselves. We need to love and to be loved. We need tenderness. –Pope Francis
We have heard from several people that they are having problems with their monitor flickering or completely shutting off for a period of time. Analyzing this there does not seem to be a pattern or a catalyst. Joe Wilsey is also experiencing this issue, and has done a lot of research trying to figure out what is going on.
It appears to be an Intel issue with the computer chip's driver. This was a problem with this chip and Windows 7 - 10. They have acknowledged the problem, and released a new driver that has not solved the problem. We will continue to check in with them hoping for a solution sooner than later.
“Your PC and mobile devices are critical to your job. Every day you rely on them to perform tasks, connect with people, and access resources. Maintaining your computer and keeping it running smoothly can even be closely tied to job performance. Keeping them running means you have to work closely with your IT department. Doing so can save you time, save your company money, and help enhance network security. This article offers tips and best practices for working with your IT department to help keep your computer and devices up to date and functioning properly.” Microsoft
Recently, we have been asked about various Bishop Kelly computer best practices. Every company you work for will offer their own ideas based off of many different factors. In most cases we have offered a rational of why it is important, this is not meant to be an exhaustive list I’m just offering a basic understanding.
Bishop Kelly Computer Best Practices
1. Do not save documents or folders on your desktop. Shortcuts on your desktop to your documents saved on the H drive are encouraged.
a. Why: It can slow down log on and log off times. Additionally it can increase the chances of losing a document that cannot be recovered if you combine it with not logging off at night.
1. All documents should be saved on your "H" drive. This can be located by clicking on the windows start orb, click on computer then locate the drive with your userid
a. Why: Documents saved here are backed up by the IT Department and can be retrieved if they go missing. This drive mapping will follow you no matter what computer on campus you log onto.
2. Log off nightly. We use what are called roaming profiles
a. Why: Updates profile files to the server to be backed up. Additionally it releases computer resources that can improve computer performance and releases files that need to be scanned by our antivirus software.
3. Reboot a least once a week (preferably every 2-3 days). - Friday afternoon works well, you do not have to stand around and wait for it to come back up. Just select reboot and head out.
a. Why: Allows the computer to clear the cache which can improve computer performance.
4. Periodically empty deleted items off your desktop. You can accomplish this by right clicking on the recycle bin, select empty recycle bin.
a. Why: Decrease logon and logoff times
5. Teacher/Student share is accessible by all students as well as teachers, also known as the G drive. The intent of this area is to share files with your students. All files placed here can be seen, changed or deleted by everyone. This sharing functionality can also be accomplished by using blackboard and is much more secure.
6. Be aware of suspicious emails.
a. A computer virus may be disguised as a downloadable file attached to an email or simply an email with only a link to a website. If you receive an email from someone you don't know, or if an email contains strange text or looks suspicious, please let us know. If you open it, or click on the link, you could cause problems for you and your coworkers.
7. Lock your workstation when you’re away.
a. Why: We have seen in the past where a student has sent email as another student. I would hate to see this happen to faculty/staff.
a. You can accomplish this by using the “Windows Key” + L when you go to walk away, this will lock your computer or you can set your screensaver to lock after a specific amount of time. Right click on your desktop background, select Personalize, select Screen Saver on the lower right hand corner, check the box “On resume, display logon screen” and adjust the wait time. I have mine set to 5 minutes but some people prefer 15.
8. Let the IT Department know when you need something.
a. If the computer is not working the way you’re used to, or if a file is missing let us know as soon as possible so we can help you.
b. If you are requesting a change in computer configuration, new software or additional equipment giving us adequate time to plan can help us respond to your needs. Otherwise, you may end up with software or hardware you don't want, which can hinder your effectiveness at work. Submit help desk tickets to [email protected]
Gmail does things differently than our old system, Digitar, you don't have to forward suspicious email anymore. When you get an email, open in it gmail (or if you are really suspicious of it, just check the box to the left of the email) and then the buttons across the top of the email will show a "stop sign" with an exclamation point on it. Just click that and Gmail will remember that this is spam and not show you that email again.
Also, to look at your spam messages, you don't need to leave Gmail. In the list of "folders"/labels on the left of the Gmail page, you need to click the "Spam" label (you may need to click "More" and find it on the list that isn't always shown. - Joe W.
cio.com Millions of Volkswagens built over the past 20 years can be broken into with a hack that exploits the cars’ remote control key systems
A little something to be aware of: http://wjhl.com/2016/08/24/4th-graders-project-on-cyber-security-proves-people-will-click-on-anything/amp/
wjhl.com His dad was not that surprised people would rather have free WiFi than a secure connection.
To re-map your home drive:
Click on the Windows flag (start button)
Type (anywhere) "remap"
Select the first option (Remap Home Drive)
This will bring up a black screen with text in it
Type in your username (first initial + last name) then hit enter
Type in your password (that crazy 13 digit password to log into your computer) (nothing will show when you do this) then hit enter
It will look like nothing happens.
Close the window and look for your "H" drive. It should be there.
Bishop Kelly High School Help Desk's cover photo
Bishop Kelly High School Help Desk
|Monday||07:30 - 16:30|
|Tuesday||07:30 - 16:30|
|Wednesday||07:30 - 16:30|
|Thursday||07:30 - 16:30|
|Friday||07:30 - 16:30|
Mr. Math and Science is a local tutoring business that offers top notch tutoring at affordable prices.
The Boise Institute for Buddhist Studies, (BIBS), aspires to help people learn, understand and practice Buddhism.
The International Economic Summit program is training the next generation of global leaders
Ranked as 13th among top Undergraduate Engineering Programs in the nation by US News and World Report in its "Best Colleges 2013"
Building community for Boise State Noyce Scholars and Alumni
Boise Classical Academy offers a curriculum both classical and dynamic, combining a faith-based foundation with the best the Classics have to offer.
A protected environment to foster quality learning, friendship, and coffee.
Pioneer School of the Arts is a School of Choice within West Ada Joint School District #2.
Pre-Engineering Classes offered at Boise High School
A cross-section of Boise State’s employees participate in a two-year program exploring leadership opportunities and issues.