” Mobile devices can expose users’ and
organizations’ valuable data to unauthorized people if
necessary precautions are not taken.
Your new post is loading...
Your new post is loading...
Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks.
These are the preliminary findings of a survey by PwC and Infosecurity Europe.
Some 75% of large organisations (and 61% of small businesses) allow staff to use smart phones and tablets to connect to their corporate systems and yet only 39% (24% of small businesses) apply data encryption on the devices.
Spotlight covers the intersections of technology and education, going behind the research to show how digital media is used in and out of classrooms to expand learning.
“When I talk to colleagues in Finland, they say, how do you filter?” said Jim Klein, director of Information Services and Technology at the Saugus Union School District in Southern California.
“They say, our kids’ filters are in their heads.
You do this by giving them a safe environment to educate themselves instead of sticking your head in the sand and pretending these technologies don’t exist.”
Upside is doing a fair bit of mobile learning development and we blog about it regularly.
I want to share some tools which may assist you in developing mobile learning applications.
Employees are increasingly using (and demanding to use) their personal devices to store and process their employer's data, and connect to their network...
Even if cost-savings is not the goal, most companies believe that processing of company data on employee personal devices is inevitable and unavoidable. Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk.
Many companies are having to play catch-up to control these risks.
This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations.
Take the example of company-owned laptop issued to an employee. When it comes to security, the company can:
Learning Activities That Capitalize On The Use of Mobile Devices:
Cross posted at the Teaching Generation Text.
The blog dedicated to using mobile devices for learning.
Want to integrate cell phones into learning? You can involve your students with this planning lesson where students will focus on cell phones as learning tools. With an overview of the educational uses of cell phones (the Gr8 8, below), students will determine how they will choose to use their cell phones for educational purposes.
Contracts for tools will be developed by students and the result will be a plan for educational uses of cell phones.