IT Services
Resources
Anti-Malware
Malware is designed to steal or corrupt your computer files, and you can’t protect yourself without anti-malware programs.
If malware gets on your computer, it can affect all those you relate to as well – family, school, and TeachBeyond.
No, hackers are always trying to find a way around these programs, so think before you click.
Use two anti-malware programs, one resident (always on) and one non-resident. Run the non-resident program once a month to catch what your main program may have missed.
Our IT department can’t make official recommendations but can say what they use. Ask knowledgeable friends.
Do an internet search for “Top 10 Best Anti-Malware for your computing device.” Free programs are more basic, but essentially use the same engine as paid versions.
Don’t just use any program you find on the internet - some of it is actually malware. Buy from a reputable source.
Your anti-malware should always be running in the background, and it should update regularly since new threats arise daily. You should be able to turn it off (temporarily) as an administrator.
Backup Systems
- External Hard Drives: Western Digital Passport series is recommended.
- Pros: They are inexpensive, small, portable, work with no internet and are very fast.
- Con: To prevent theft of both computer and hard drive, you cannot store these together.
- Network Attached Storage:
- Pros: These are fast, work with no internet, have a lot of storage space, and can be kept out of sight.
- Cons: They are more expensive and are not portable.
- Cloud Storage:
- Pros: Simple to set up and One Drive is free for TeachBeyond members.
- Cons: If your computer is hacked, your backup files can be deleted; requires internet; may have problems if a lot of storage required.
- Manually: You can copy files you have created to the backup drive. It’s not recommended since you can forget, and it takes time.
- Software included with your computer: This may or may not be free, works automatically, you need to learn how to use it.
- Built-in software on PC or Mac: It’s free, automatic, and you need to learn how to use it.
- Retrospect: About $129 for 5 computers, more flexible than PC or Mac products, very capable, not too hard to learn, recommended.
- CrashPlan/Acronis: $120 per year/$50 per year: More flexible than PC or Mac
- Do a backup of your system.
- Shut down the computer.
- Remove the hard drive from the computer, and replace the old hard drive with a new freshly formatted hard drive.
- Power up the computer. Restore the computer without losing any of your important data
Microsoft 365
- Turn on your device and log into your account.
- In your preferred web browser, visit https://teams.microsoft.com/downloads or https://tb365.org/teams.
- Click on the button labeled “Download Teams.” Do the download.
- Install Teams by running or executing the downloaded file.
- In the pop-up window, enter your TeachBeyond email address in the box labeled “Sign-In Address.”
- Click on the hot button labeled “Sign In”.
- Select “Work or School Account.” (This may or may not appear.) Enter the password for your TeachBeyond email account.
- Click“Sign In.” Microsoft Teams is now signed in with your account, and you are good to go!
Tablet, mobile phone or Chromebook:
- Turn on your device and log in.
- Go to the respective App Store for your device.
- Search for Microsoft Teams. Download and install the app.
- When you open the app, a window will pop-up. Enter your TeachBeyond email address in the box labeled “Sign-In Address.”
- Click on the button labeled “Sign In.”
- Select “Work or School Account.” (This may or may not appear.) Enter the password for the TeachBeyond email account.
- Click “Sign In.” Microsoft Teams is now signed in with your account, and you are good to go!
- Restart your computer, ensuring that no apps restart where they were when you shut down.
- Login into an Administrative account.
- Make sure there is nothing left of the old office.
- In your preferred web browser, open this link: tb365.org/software
- Click on the button labeled “Install Office,” and follow the instructions on the screen.
There are two options for Microsoft Office available to you through TeachBeyond as soon as you have a TeachBeyond email address. TeachBeyond recommends choice number 2. Please note that, within six months of ending service with TeachBeyond, your TeachBeyond email address and Office package will no longer be accessible.
Option 1: Web-Based Office 365
With this option, no Office software is installed on the local computer. The local computer screen displays the output, but the actual work is done in the cloud. Therefore, if the Internet is not available, Office programs will not be accessible. This software package has a limited number of applications and features, but the software is always kept up to date.
Option 2: Microsoft 365 Apps
The Microsoft 365 Apps software is downloaded and installed on the local computer, so the Office programs are accessible whether or not Internet is available. The software package has the full set of applications and features, and is always kept up to date.
TeachBeyond will cover the cost of this package for members who complete the training course and pass a brief test. See the instructions below:
- Click the links below to watch the training videos.
- Email Norm Siemens (nsiemens@teachbeyond.org) to request the brief (open-book!) test.
- Return the completed test to Norman, and he will set you up with a free Microsoft 365 account.
To reset your TeachBeyond Microsoft 365 password, go to tb365.org/signin
When you are prompted for your password, first try what you think it should be. If that password doesn't work, click Forgot my password and follow the steps to set a new password.
You can either get a code sent to your alternate email or use your Microsoft Authenticator app to confirm your identity.
Cybersecurity
Those wishing to obtain additional information about cybersecurity can contact Norman Siemens at nsiemens@teachbeyond.org. Articles are available on cyber heist, hacking multi-factor authentication, sender identity, and cyber security training.
- It encrypts communications for privacy. The communications are encrypted from the personal computer to the VPN Server. This means that the communication is impossible to read without the key.
- The device appears to be located where the VPN Server is. If you utilize a VPN from your passport country, your computing device will appear to be located there, regardless of where you are in the world. This is useful for accessing information that is blocked at borders.
- Others are blocked from having access to the computer. This is most useful in airports, hotels, and other public places with public Internet access.
- Public place: It is advisable to use a VPN in a public place, such as an airport or hotel, regardless of country.
- Country-Specific: There may be times that you want your computer to appear as if it is in your passport country, such as online shopping or watching videos.
- Creative Access: Always use a VPN when you are using a computing device that connects to the internet inside a Creative Access Country.
When you are located in a sensitive place*, TeachBeyond policy requires that VPN is used to access TeachBeyond email and to view the TeachBeyond website and other sensitive websites on the Internet.
*Sensitive places include Creative Access Countries, as well as public areas, such as Internet cafes, hotels, and other places with open access public internet.
TeachBeyond recommends and has entered into agreement with Stormwind. Stormwind provides IPsec technology, which is the best. The discounted cost is taken directly from your ministry account.
To set up a Stormwind account, contact Norman Siemens (nsiemens@teachbeyond.org) and he will instruct you in the process.
The courses below are available for one-on-one training, virtual classroom, Moodle, or other online format. Contact Norm Siemens (nsiemens@teachbeyond.org) for more information.
- Cyber Security – VPN Training and Audit
- Cyber Security and TeachBeyond Policies, Standards and Guidelines
- Cyber Security and The Software Pillars of Computing Devices
- Cyber Security in Your Own Home
- Cyber Security While Travelling. Creative Access Country Security Discussion
- Cyber Security – Social Engineering and Malware
- Office 365 Training – Video Training provided by Microsoft
- Intercultural Training for the Expat and the would-be Expat. There is a fee for this. This is online but not on Moodle.
- Computer Security Essentials and You. On the TeachBeyond Moodle platform.
That One Privacy Site: This provides a reasonable comparison of different VPN providers.
VPN Pro: A helpful article about how things are not always what they seem to be.
Privacy Tools: A look at VPN web reviews and some of the biases that come into play.
Telegraph Article: An interesting story as governments and security agencies try to gain control over VPN services