Create, Innovate ...
Follow
Find tag "IT-Security"
18.4K views | +7 today
Create, Innovate & Evaluate in Higher Education
All about Educational Innovation, new tools & trends, MOOCs in Higher Education
Curated by Alfredo Corell
Your new post is loading...
Your new post is loading...
Rescooped by Alfredo Corell from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | Create, Innovate & Evaluate in Higher Education | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
more...
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD

Rescooped by Alfredo Corell from 21st Century Learning and Teaching
Scoop.it!

10 BYOT / BYOD Back to School Basics

10 BYOT / BYOD Back to School Basics | Create, Innovate & Evaluate in Higher Education | Scoop.it

Gone are the days where students sit neatly in rows all prepared with the same back to school supplies ready to consume instruction. As the 2012/13 school year approaches, one thing is clear. One-size-fits-all is out and personalization is in. This doesn’t only apply to the classroom instruction, it also applies to the mobile devices your students choose to use for learning.

 

===> Today student choice = personalization. The teacher sets the learning goals, but students choose their own tools or learning. <===

 

Gust MEES: Don't forget about IT-Security and be aware of the malware! "Nobody is Perfect!", so ALL "OS" are vulnerable and especially smartphones and any other device connecting to Internet also! And there are also a lot of Apps around who are malicious...

 

===> Take care and as teacher and educator take your ===> responsibilities <=== to educate your learners of the dangers of Internet and How-To protect best! <===

 

In 21st Century while using "Bring Your Own Device" (Hashtag for Twitter = #BYOD) there is a MUST to know about basic IT-Security knowledge! The teachers role is NOT anymore to be the MOST important person, but the LEARNER!

 

So the teacher needs to have that basic knowledge to share it with its learners and to try to keep a safe Learning Workspace... Online and Offline, in the "internal learning network" and also in the "external learning network"!

 

As Teachers, Educators and Instructors we have to deal with Apps, OpenSource software, Freeware, different OS devices, so we need to know about the risks and dangers! We need to know how to get protected these devices also!

 

It's not ONLY the IT-Admin's responsibility, IT-Security is the responsibility of ALL of us!!!

 

Check also:

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

  

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

  

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

  

- http://www.scoop.it/t/ict-security-tools

  

- http://www.scoop.it/t/securite-pc-et-internet

 

 

                         ===> Be aware of the malware! <===

 


Via Gust MEES
more...
EdTechSandyK's comment, August 3, 2012 12:13 PM
When I rescooped your post, I did not realize I was erasing someone else's comments. I thought I was just cleaning up extra-text that had been auto-inserted at some point. I was also concerned that there was a malware warning included in what I thought was auto-generated text; I did not want to keep links with the post that might spread malware.

I am still learning about the ins and outs of ScoopIt; it is unfortunate that you jumped immediately to the conclusion that I was censoring you because that was not my intention. Per your request, I will remove the re-scoop post my topic, since I now understand the comments were inserted by a user but do not want to share links that might include malware. Thank you for contacting me. I apologize for my unintended offense.
Gust MEES's comment, August 3, 2012 12:18 PM
Hi Sandy,

OK, everything alright now. My apologies for having reacted also that way, but when it is about Censorship of my own text...

Concerning "malware", You don't have to fear about my links, just have a look at my profile on the bottom of my free IT-Security courses (links above in the text) and You will understand that they are secure ;)

Have a great day,
Gust
Gust MEES's comment, August 3, 2012 12:25 PM
Hi Sandy,

It is important that learners get told how to protect their BYOD-Devices and to know also about the dangers with it. So that's why I included thta special text with links. When now someone makes a rescoop of your "rescooped" censored #scoopit then it would:

1.) Not include my original text with advice and links
2.) Other people who will "rescoop" from your #scoopit will also not get that important knoledge

Have a great day,
Gust