ENT
22.3K views | +7 today
Follow
ENT
Articles autour des ENT - Espace numériques de travail
Your new post is loading...
Your new post is loading...
Rescooped by Vincent Martinet from 21st Century Learning and Teaching
Scoop.it!

Teach Kids To Be Their Own Internet Filters

Teach Kids To Be Their Own Internet Filters | ENT | Scoop.it
Students live in an information saturated world. The most effective way to keep them safe and using the internet responsibly as a learning tool is to teach them how to be their own filters.

Via Gust MEES
more...
Say Keng Lee's curator insight, October 7, 2013 3:12 AM

Useful for the adult pros as well, especially the evaluation criteria suggested...

Philip Verghese 'Ariel's curator insight, October 7, 2013 9:45 AM

Yes, Gust, let them felter themselves, and ha, let us guide them. Thanks for the share Gust.

Eileen Forsyth's curator insight, January 17, 2014 12:28 PM

SAGE ADVICE on how to teach kids to filter themselves (digitally)

Rescooped by Vincent Martinet from 21st Century Learning and Teaching
Scoop.it!

Cyber Europe 2012 : l'Europe s'entraîne à subir des attaques DDos

Cyber Europe 2012 : l'Europe s'entraîne à subir des attaques DDos | ENT | Scoop.it
L'Enisa mène chaque année des « stress test » destinés à tester les mesures de sécurité des réseaux européens. Ce jeudi, une attaque par déni de service d'envergure a été dirigée notamment c...

 

Après la constitution d'un centre européen d'intervention d'urgence (CERT-UE), l'Europe compte améliorer les collaborations entre Etats-membres.

 

===> La Commission indique également qu'à l'avenir, des exigences en matière de sécurité informatique devraient être imposées au secteur privé. <===

 

En savoir plus :

 

http://www.clubic.com/antivirus-securite-informatique/cyberpolice/actualite-514645-cyber-europe-2012.html

 


Via Gust MEES
more...
No comment yet.
Rescooped by Vincent Martinet from 21st Century Learning and Teaching
Scoop.it!

BYOD: Mobile security stats

BYOD: Mobile security stats | ENT | Scoop.it
OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most concerning topics in the industry.

 

Gust MEES

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

           ===> Be aware of the malware!!! <===

 

Read more:

http://www.scmagazine.com/mobile-security-stats/slideshow/805/#0

 


Via Gust MEES
more...
No comment yet.
Rescooped by Vincent Martinet from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | ENT | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
more...
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD

Rescooped by Vincent Martinet from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD Security Issues [Infographic]

BYOD Security Issues [Infographic] | ENT | Scoop.it
BYOD Security Issues: How safe is the common practice for employees to Bring their Own Device into work?

Via Gust MEES
more...
malek's curator insight, September 17, 2013 8:23 AM

A myriad of threats:

* Employers often cannot assess data breach exposure on unmanaged BYODs

*Lost or stolen BYODs  that  contain sensitive data, with less than 1 in 4 can be remotely wiped.

* When BYODs bypass inbound filters normally applied to corporate devices, they’re vulnerable to malware

and the list goes on and on


TheSoulfulEMU's curator insight, September 24, 2013 10:12 AM

Now that you know it, so DONT- BYOD!!! Got it?

Bruce McDuffee's curator insight, September 25, 2013 11:41 PM

Interesting BYOD stats.

Rescooped by Vincent Martinet from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | ENT | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
more...
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD

Rescooped by Vincent Martinet from 21st Century Learning and Teaching
Scoop.it!

Trends | Infographic: Apps and Education

Trends | Infographic: Apps and Education | ENT | Scoop.it
Provided By: OnlineColleges.net...

 

Gust MEES: please accept my Critical-Thinking again! Education makes a great publishing with Infographics and Blogs, BUT they forget every time to consider "IT-Security" and "Privacy" which I start to... sorry... I am from Europe, we take it more serious...

 

Check here for better protection on "Privacy" and also "IT-Security:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=App+Advisor+by+secure.me

 

 


Via Gust MEES
more...
No comment yet.