21st Century Tool...
Follow
Find tag "ICT-SECURITY"
72.7K views | +6 today
21st Century Tools for Teaching-People and Learners
21st Century Tools to help teaching-people and learners to achieve "BETTER" their tasks...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

security in the age of mobility [pdf]

” Mobile devices can expose users’ and
organizations’ valuable data to unauthorized people if
necessary precautions are not taken.

 

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

The Security, Privacy and Legal Implications of BYOD

The Security, Privacy and Legal Implications of BYOD | 21st Century Tools for Teaching-People and Learners | Scoop.it
The Security, Privacy and Legal Implications of BYOD


Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable.

 

Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. Many companies are having to play catch-up to control these risks.

 

===> This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations. <===

 

Read more...

 

more...
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOT: Bring Your Own Token

BYOT: Bring Your Own Token | 21st Century Tools for Teaching-People and Learners | Scoop.it
SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization.

 

At the click of a button users can have their authentication token as an SMS on a mobile, an app on a smartphone or tablet, or a soft token on a laptop – with the ability to swap between devices at will.

 

Read more...

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Stop Think Connect

Stop Think Connect | 21st Century Tools for Teaching-People and Learners | Scoop.it

These posters are a great way to raise awareness about good online safety habits and tips.

 

Our 10 posters offer helpful reminders about everything from keeping a long, strong password to making sure your software is up-to-date.

We encourage you to download them, print them out and post them in your home, office, classroom community centers or religious establishments to get the word out!

 

You can download the posters by clicking on a thumbnail image below or in our Resource Center.

 

===> Gust MEES: great initiative, use it, please! <===

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

The next step in #BYOD #security

The next step in #BYOD #security | 21st Century Tools for Teaching-People and Learners | Scoop.it

The explosion in development and adoption of smartphones and tablets for both personal and business use in the past two years is both a blessing and a curse to IT departments globally.

 

Known as the Bring Your Own Device (BYOD) phenomenon, on one hand, there is an opportunity for greatly increased productivity and decreased costs.

 

===> On the other, there are increased security risks, management issues and even data and device ownership and governance issues. <===

 

 

more...
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Security, Privacy, and Online Safety Brochures and Fact Sheets

Security, Privacy, and Online Safety Brochures and Fact Sheets | 21st Century Tools for Teaching-People and Learners | Scoop.it
Download free brochures and fact sheets from Microsoft that you can use to teach classes or groups about computer and Internet security.
more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Mac users 'just as easily duped by cybercriminals' as Windows users

Mac users 'just as easily duped by cybercriminals' as Windows users | 21st Century Tools for Teaching-People and Learners | Scoop.it
In the face of new threats aimed at OS X, a security expert has warned that Mac users may be even more vulnerable than Windows users.

 

Because Windows users are more likely to be running up-to-date anti-virus programs, Graham Cluley of Sophos says that many Mac users are missing a "valuable safety net".

 

In the face of several new threats targeting Mac OS X that have been discovered in recent weeks, Mac users should make sure that they have some form of protection, Cluley said. However, keeping your computer safe from cybercriminals isn't just a case of having anti-virus programs installed - it's about making sensible choices as well.

 

As we have seen on the Windows platform, the majority of the attacks do not exploit any weakness in the operating system but instead take advantage of the bug in people's brains.

 

===> Mac users can be just as easily duped as their Windows cousins into making poor choices, and could end up infected as a result, Cluley told Macworld. <===

 

Use antivirus programs!

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD Infographic: For security it's not a pretty picture

BYOD Infographic: For security it's not a pretty picture | 21st Century Tools for Teaching-People and Learners | Scoop.it
As ESET's BYOD Infographic shows, BYOD is no LOL matter, bringing with it some serious risks to company networks and data. Based on an ESET Harris Interactive survey.

 

Another BYOD risk factor is the practice of letting someone else use the device. This could be "just" a family member or friend but it introduces the possibility of that person gaining access to the company network or sensitive company data stored on the device.

 

===> Furthermore, if this "other person" is not trained in safe computing practices there is a serious risk of them getting the device infected or compromised. <===

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Creating a Robust and Safe BYOD Program

Creating a Robust and Safe BYOD Program | 21st Century Tools for Teaching-People and Learners | Scoop.it

Network Security and More


Don Knezek, executive director of the International Society for Technology in Education (ISTE), notes that starting a BYOD program means making adjustments when it comes to security, especially protecting a district’s proprietary and secure data. That function, he says, used to be handled by an effective firewall that kept out unwanted users and their devices.

 

“Nowadays, you have to have a layer past the firewall that we didn’t have to deal with when we simply said no to user-owned devices,” he says. “Now all of a sudden, you have multiple points of entry at different levels of access, and that requires more diligence.”

One key to maintaining adequate security, Knezek and other experts say, is to have multiple networks: one for Wi-Fi traffic, one for district business and for other secure information for teachers and administrators only, and one for students and outside users of the district’s Web site.

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD - Cult of Mac

This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD - Cult of Mac | 21st Century Tools for Teaching-People and Learners | Scoop.it
This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD [Interview]Cult of MacOn the front lines of the Bring-Your-Own-Device (BYOD) movement, she's created an iPad class approved by the New York State Continuing Legal Education Board.
more...
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Why Antivirus Protection Is Key to Computer Security

Why Antivirus Protection Is Key to Computer Security | 21st Century Tools for Teaching-People and Learners | Scoop.it
To go online is to live dangerously. Aside from the risk of viruses, there are also worms and Trojan horses -- all trying to find an unsecured computer upon which to work their mischief.

 

Check out also:

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

- http://gustmeesen.wordpress.com/2012/01/05/pc-security-howto-secure-my-pc/

more...
No comment yet.
Rescooped by Gust MEES from Social Media and its influence
Scoop.it!

Social Medias and its Influence: Adventure with IT-Security Tweeps on Twitter

Social Medias and its Influence: Adventure with IT-Security Tweeps on Twitter | 21st Century Tools for Teaching-People and Learners | Scoop.it

Hi, First of all let me tell you that on the beginning when I joined Twitter I really wasn’t a friend of it as I didn’t see its advantages. I am an ICT Course Instructor and also an author who has written a lot of articles, blogs, tutorials and courses who were read +/- 4 million times in total...

 

Here my #SoMe adventure; read more... "A True Story"...

more...
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

How-To make sure that my shared links are not malicious?

How-To make sure that my shared links are not malicious? | 21st Century Tools for Teaching-People and Learners | Scoop.it

#education #edchat #edtech How-To make sure that my shared links are not malicious?

 

Check my #scoopit http://www.scoop.it/t/ict-security-tools?tag=urlQuery

 

more...
No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD is both an opportunity and a threat

BYOD is both an opportunity and a threat | 21st Century Tools for Teaching-People and Learners | Scoop.it
"iPhones, iPads, Androids, Tablets are pouring into organizations. In today's BYOD culture, AirTight often sees 3 times as many unmanaged personal devices in a customer's airspace than corporate devices.

 

===> The key to keeping your network secure is to manage those devices." <===

 

Read more...

 

more...
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet