Technology and Ed...
Follow
Find tag "IT-Security"
18.7K views | +2 today
Technology and Education Resources
This is a media format dedicated to technology tools, websites, and resources for educators.
Your new post is loading...
Your new post is loading...
Rescooped by R.Conrath, Ed.D. from 21st Century Learning and Teaching
Scoop.it!

How to keep your neighbors from hijacking your Wi-Fi

How to keep your neighbors from hijacking your Wi-Fi | Technology and Education Resources | Scoop.it
Your Internet connection could be slow for many reasons, but you can rule out local Wi-Fi thieves by employing strong passwords and a few other strategies.

Via Gust MEES
more...
Rescooped by R.Conrath, Ed.D. from 21st Century Learning and Teaching
Scoop.it!

Internet Safety for Adults

Internet Safety for Adults | Technology and Education Resources | Scoop.it

Via Gust MEES
more...
Rescooped by R.Conrath, Ed.D. from 21st Century Learning and Teaching
Scoop.it!

Trends | Infographic: Apps and Education

Trends | Infographic: Apps and Education | Technology and Education Resources | Scoop.it
Provided By: OnlineColleges.net...

 

Gust MEES: please accept my Critical-Thinking again! Education makes a great publishing with Infographics and Blogs, BUT they forget every time to consider "IT-Security" and "Privacy" which I start to... sorry... I am from Europe, we take it more serious...

 

Check here for better protection on "Privacy" and also "IT-Security:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=App+Advisor+by+secure.me

 

 


Via Gust MEES
more...
No comment yet.
Rescooped by R.Conrath, Ed.D. from packetsalty
Scoop.it!

Cyber-Security Practice: Learn it in one week

Cyber-Security Practice: Learn it in one week | Technology and Education Resources | Scoop.it
. . Read, think, learn and share over Social Media… Security is everyone's responsibility! We are ALL responsible for the Internet's future! . ===> "Nothing in life is to be feared. It is only t...

 


Via Gust MEES, packetsalty
more...
hedgeshandy's comment, October 17, 2013 3:24 AM
Thats stunning...
Jean-Robert Bos's curator insight, March 31, 11:21 PM

Apprenez à sécuriser en 7 jours

keamogetswe Dikobe's curator insight, July 29, 12:10 AM

information technology

Rescooped by R.Conrath, Ed.D. from 21st Century Learning and Teaching
Scoop.it!

Interactive Maps of Infected Websites

Interactive Maps of Infected Websites | Technology and Education Resources | Scoop.it

Find out in real time which are the TOP 10 infected websites by country...

 

Check out, a MUST:

http://www.avast.com/maps

 


Via Gust MEES
more...
No comment yet.
Rescooped by R.Conrath, Ed.D. from 21st Century Learning and Teaching
Scoop.it!

Five IT security threats and how to combat them

Five IT security threats and how to combat them | Technology and Education Resources | Scoop.it

Faced with external security threats from hackers and others, along with a growing array of even more dangerous internal security threats, companies worldwide are feeling the heat.

 

Organizations traditionally have had only two options to address identity and access management:

 

1. Internal excessive privilege - System Administrators with complete access to servers and data can pose a tremendous internal threat if they turn against the company. Similarly, everyone from admins up to executives poses a threat to security and data if they maintain excessive access rights after changing positions or taking on different roles.

 

2. Third party access - Giving partners and other third parties appropriate access to data is no longer cut and dried. Data stored in the cloud may be located across the country or overseas—or sit on physical servers owned by one vendor, but housed in facilities owned by any number of data centers. Employees of these third parties often have direct access to unencrypted data, or they may retain copies of both encrypted or unencrypted data.

 

3. Hacktivism - Politically motivated hacking is on the rise. Members of various groups assert that much of their success comes not from their technical expertise, but from having found easy targets. While an organization may not have control over whether or not it is attacked, effective identity and access management strategies and technologies, and basic employee security training, will reduce the chances that attacks will succeed.

 

4. Social engineering - Social engineering is the age-old technique of using lies, deception and manipulation to gain sufficient knowledge to dupe an unwary employee or company. Using public social channels to detail every aspect of your upcoming “unplugged” vacation trip may be just what a scammer needs to put an attack in motion.

 

5. Internal negligence - Negligence typically is an offense committed by management when “they should have known better.” Most successful data security breaches have some element of managerial negligence associated with them, such as simply forgetting to check log reports for clearly suspicious patterns.

 

Gust MEES: A MUST READ for Education and Business!

 

Read more:

http://www.net-security.org/secworld.php?id=13084&utm_source=dlvr.it&utm_medium=twitter

 


Via Gust MEES
more...
No comment yet.