Author: EngagED Learning

Magazine Articles

Teachers’ Essential Guide to Cybersecurity

Most educators don’t spend their days thinking about cybersecurity. Between classroom management, learning objectives, and so much more, it usually doesn’t rise to top priority. But as technology evolves and continues to become more integrated into every aspect of our lives— including mental health and biometrics—and cybercrime increases and sometimes targets schools, cybersecurity is something we need to be mindful about and help students understand. 

To access this post, you must have an active subscription to the magazine with digital option. Click here to know more! or log in.

Read More »
Magazine Articles

Tips for Cybersecurity in Schools

At Nova Scotia’s Conseil Scolaire Acadien Provincial (CSAP), cybersecurity is taken seriously. In collaboration with the province’s Department of Education and Early Childhood Development and other provincial school boards, robust measures are in place to protect networks against cyberattacks. 

To access this post, you must have an active subscription to the magazine with digital option. Click here to know more! or log in.

Read More »
Magazine Articles

The Digital Challenges of Bill 25 on the Protection of Personal Information in Québec

Have you ever taken a picture of a student with your personal cell phone? Have you ever left your school computer unattended? Have you ever recorded student work on your personal computer? Or have you ever talked about a student, in front of several uninvolved colleagues, without concealing the student’s identity? If you answered “yes” to any of these questions, you should read this article!

To access this post, you must have an active subscription to the magazine with digital option. Click here to know more! or log in.

Read More »
Magazine Articles

THE FINAL NOTE : 5 Questions for Terry Cutler, An Ethical Hacker

Terry Culter is a cybersecurity expert who describes himself as an ethical hacker. Ethical hackers are benevolent hackers who test and identify vulnerabilities in corporate computer systems and networks to prevent and neutralize potential internal or external attacks. We asked him 5 questions.  

To access this post, you must have an active subscription to the magazine with digital option. Click here to know more! or log in.

Read More »
Newsfeed

The Shadow IT Phenomenon

Do you know what shadow IT is? It occurs when a staff member uses or deploys a technological system, application, or software without the IT department’s knowledge. Learn more in this article from the Québec Ministry of Education.

Read More »
Newsfeed

Numberless math’ gets kids thinking about and visualizing algebra

The article from The Conversation discusses the concept of “numberless math” in elementary education, where tasks involve only pictures to encourage students to think and visualize algebra. This approach helps students develop mathematical ideas and engage in problem-solving without relying on numbers, promoting deeper understanding and discussions about algebraic concepts through visual and interactive methods.

Read More »

Log in!

If you are subscribed, log in to access exclusive member content!

[login_widget]
[forgot_password title="Forgot your password?"]