Technology Department
Phone: 701.857.4429
Fax: 701.857.4405

Staff

5 months ago

Technology Staff photo

Technology Director

Alicia Eslinger  

Network Administrator

Brian Rossow

Administrative Assistant

Karen Kuhnhenn

Tech Support Specialists 

Dustin Bergrude 

Ryan Tittle (not pictured)

Shane Gathman

Chris Guilbert 

Trent Hall 

TJ Kinchen 

Scott Slorby

Secondary Tech Facilitators

Brian Aufforth

Kim Hunter

Tom Scheeler

Elementary Tech Coaches

Karin Haas

Matt Nelson

Judy Walter

Tech Request
MCC B.Y.O.D. Guidelines
Accessibility
Technology Staff Members
  • Passwords - Security Tip of the Week
    PASSWORDS
    Passwords are one of the ways we prove who we are on the network/system. Having a strong, unique password for each of your devices, online accounts and applications is a key strategy for protecting your online identity.
    - A strong password means it cannot be easily guessed by hackers or by their “brute force” automated programs. Instead of a single word, use a long passphrase of multiple words with some symbols and numbers thrown in for good measure.
    - A unique password means using a different password for each device and online account. This way, if one password is compromised, all of your other accounts and devices are still safe. Food for thought: Do you really want your Google, Facebook, or Pinterest account password to be the same as your Bank or Investment account password?

    Examples of a passphrase:
    I love shopping 1L0v3$h0pp1ng
    Let’s go fishing L3tsg0Ph1$hing

    Remember, it is everyone’s responsibility to ensure the network and the information on the network is secure.

    Thank you Steve Palmer, K12 Information Systems Security Analyst for the Security Tip of the Week.
  • Phishing - Security Tip of the Week
    PHISHING
    Email has become one of the primary ways we communicate in our personal and professional lives. Because e-mail is so widely used, it is one of the favorite ways cyber criminals use to attack individuals and businesses. Phishing refers to an attack that uses email that tricks into taking an action, such as clicking on a link or opening an attachment. By falling victim to such an attack, you risk having your personal information stolen and/or your computer infected.

    Attackers work hard to make their phishing emails convincing. For example, they will make their email look like it came from someone or something you know, such as a friend or a trusted company. They will even add logos of your bank or forge the email address so the message appears more legitimate. Be aware and use common sense, if an email seems odd or too good to be true, it is most likely an attack.

    With Tax season approaching, be aware of IRS and Bank scams associated with tax refunds.

    Security is everyone’s responsibility.

    Thank you Steve Palmer, K12 Information Systems Security Analyst for the Security Tip of the Week.
  • Backups - Security Tip of the Week
    BACKUPS
    Backups are an important part of your computer or mobile devices maintenance. It is just as important, if not more, than patches and software upgrades.
    When it comes to backing up data (pictures documents, spreadsheets, banking software, etc), there can be a lot of varying opinions on how often you should backup your computer or mobile device. The most important thing is to have a backup before a potential data loss disaster happens. Without a backup, there is little to no chance of recovering the data. These days, most operating systems and mobile devices support automatic backups. Chances are good yours does, so set it up.
    Sometimes, no matter how careful you are, your computer or mobile device could become compromised by a malicious virus, you have a corrupt hard-drive that crashes, or it slips out of your hand and shatters on the floor. Whatever way it happens, you may need to do a restore or recovery to get that device and your information back in working order.

    Can you answer these questions?
    o Have you backed up your computer or mobile device?
    If yes, good for you.
    o Do you remember when?
    o Do you know where it is located?
    Is it on a thumb drive, external hard-drive, network drive, the cloud?
    o Do you know how to restore the backup to your computer if necessary?

    In the Age of Information, data is important, so make sure you do not lose yours.

    Thank you Steve Palmer, K12 Information Systems Security Analyst for the Security Tip of the Week.




  • Social Media
    Social Media
    In one form or another, people are using social media websites to meet, interact and share with people from around the world. Sites like Facebook, Twitter, Instagram, and LinkedIn are very popular and are amazing resources for connecting with other people. With great power comes great responsibility, and if not used correctly, these sites and the information you share on them could create some risks for you, your family, friends, and employer.

    Here are some of the risks to consider and how to protect yourself when using social media websites:

    *Privacy
    · Future impacts
    There are some organizations that will search social media websites when conducting background checks on potential employees and new student applications. Embarrassing or incriminating photos could prevent you from getting hired or promoted.

    · Attacks Against You
    Cyber Attackers can analyze your posts and use them to gain access to your information. They can use the information you share to guess the answers to the secret questions that reset your online passwords, create targeted e-mail attacks against you (spearfishing), or call someone in your organization pretending to be you. They can even use this information to identify where you work or live.

    The best protection when using social media is to be aware of the information you post. Social media is exactly that, social, but to someone seeking information about you, it can be a treasure-trove. Privacy settings do provide a level of protection, but they vary from site to site and change frequently.

    *Security
    · Login
    Protect each of your accounts with a strong unique password and do not share them with anyone else.

    · Privacy settings
    Make sure you use the privacy settings offered by the Social Media website and make sure you review and test those settings regularly.

    · Encryption
    Most social media websites use encryption called HTTPS to secure your online connections. Check to make sure your account settings are enable to use HTTPS by default.

    · E-mail
    Be suspicious of e-mails that claim to come from social media sites. These can easily be spoofed attacks sent by cyber criminals.

    · Mobile Apps
    If your social media website has a mobile app, make sure you download these apps from a trusted site and that your smartphone is protected with a strong password.

    Thank you Steve Palmer, K12 Information Systems Security Analyst for the Security Tip of the Week.



View More

Mobile Experience

No need to download an app! To view the mobile experience, please shrink your browser window by undocking the browser in order to make it resizable then resize the browser to be the size of an iPad then an iPhone.

Close
View More

Mobile Navigation

When your browser’s width conforms to a tablet or mobile phone, the menu bar changes to be mobile optimized.

Close
View More

Login

Login to view additional information on features available to registered users.

Close
View More

Login

Login to view additional information on features available to registered users.

Close
View More

By clicking on your name, you find your personal tools including a combined calendar, feed and more.

Close
View More

By clicking on your name, you find your personal tools including a combined calendar, feed and more.

Close
View More

Admin Button

This admin button appears wherever you have rights to alter a set of blocks. To add a block, click “Add Block” to see the options.

Close
View More

SchoolBlocks offers a unique and powerful personalized search system. A member of the public, searching for "homework" might see an announcement from the school as the first result. However, if the user is logged in, they would see their teacher’s latest homework assignment as the top result.

Close