Category: Magazine Articles

Magazine Articles

Teachers’ Essential Guide to Cybersecurity

Most educators don’t spend their days thinking about cybersecurity. Between classroom management, learning objectives, and so much more, it usually doesn’t rise to top priority. But as technology evolves and continues to become more integrated into every aspect of our lives— including mental health and biometrics—and cybercrime increases and sometimes targets schools, cybersecurity is something we need to be mindful about and help students understand. 

To access this post, you must have an active subscription to the magazine with digital option. Click here to know more! or log in.

Read More »
Magazine Articles

Tips for Cybersecurity in Schools

At Nova Scotia’s Conseil Scolaire Acadien Provincial (CSAP), cybersecurity is taken seriously. In collaboration with the province’s Department of Education and Early Childhood Development and other provincial school boards, robust measures are in place to protect networks against cyberattacks. 

To access this post, you must have an active subscription to the magazine with digital option. Click here to know more! or log in.

Read More »
Magazine Articles

The Digital Challenges of Bill 25 on the Protection of Personal Information in Québec

Have you ever taken a picture of a student with your personal cell phone? Have you ever left your school computer unattended? Have you ever recorded student work on your personal computer? Or have you ever talked about a student, in front of several uninvolved colleagues, without concealing the student’s identity? If you answered “yes” to any of these questions, you should read this article!

To access this post, you must have an active subscription to the magazine with digital option. Click here to know more! or log in.

Read More »
Magazine Articles

THE FINAL NOTE : 5 Questions for Terry Cutler, An Ethical Hacker

Terry Culter is a cybersecurity expert who describes himself as an ethical hacker. Ethical hackers are benevolent hackers who test and identify vulnerabilities in corporate computer systems and networks to prevent and neutralize potential internal or external attacks. We asked him 5 questions.  

To access this post, you must have an active subscription to the magazine with digital option. Click here to know more! or log in.

Read More »

Girls at the Crossroads of Coding and Entrepreneurship

Imagine if all girls reached adulthood with strong coding and entrepreneurship skills.  In a world where technology and business are increasingly converging, this would certainly have the potential to reduce the gender gap in these fields. However, for this to happen, girls need access to inspiring and accomplished female role models to guide them in their professional ambitions.

To access this post, you must have an active subscription to the magazine with digital option. Click here to know more! or log in.

Read More »

Log in!

If you are subscribed, log in to access exclusive member content!

[login_widget]
[forgot_password title="Forgot your password?"]