Technology Enhanc...
Follow
Find tag "Cybersecurity"
2.3K views | +0 today
Technology Enhanced Learning & ePortfolio
Collect every bits of information about teaching and learning with technology and use of ePortfolio as thé center of self PLE (Personal Learning Environment)
Your new post is loading...
Your new post is loading...
Rescooped by Dominique-Alain JAN from 21st Century Learning and Teaching
Scoop.it!

IT professionals do not display enough concern for data encryption

IT professionals do not display enough concern for data encryption | Technology Enhanced Learning & ePortfolio | Scoop.it

Nearly two-thirds of IT professionals have admitted that they do not encrypt data stored on portable storage devices.

 

According to a survey of 106 delegates at IP Expo 2012 by iStorage, 64 per cent admitted to not encrypting data held on portable storage devices, while fewer (than those surveyed in 2011) believed that data loss was a serious concern. (!!!???)

 

============================================

 

Gust MEES

 

I am actually preparing a new FREE course about the "Cyber-Security Practice-the basics" which everyone can and should learn, very easy actually... There will be also included a FREE solution for encrypting the complete Hard Disk, stay tuned... It will be published here (soon):

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

============================================

 

 

Read more, a MUST:

http://www.scmagazineuk.com/it-professionals-do-not-display-enough-concern-for-data-encryption/article/270509/?utm_source=dlvr.it&utm_medium=twitter

 

 

 


Via Gust MEES
more...
No comment yet.
Rescooped by Dominique-Alain JAN from 21st Century Learning and Teaching
Scoop.it!

7 Steps to Safer Social Media in the Classroom

7 Steps to Safer Social Media in the Classroom | Technology Enhanced Learning & ePortfolio | Scoop.it
How to create guidelines for responsible use of social tools.

...

1. Examine your school culture. Gain an understanding of how your community feels about social media.

 

2. Organize a team. Include both educators who use social media in the classroom and those who do not.

 

3. Research. Evaluate policies already in place at your school. Look around at other schools. See what they’ve done. Get a sense for what works and what doesn’t.

 

4. Write a draft and solicit feedback. This is the hard part, says Anderson. Gather the information you’ve collected and ask others to weigh in. Schedule meetings and talk to stakeholders face to face.

 

5. Have the draft vetted by the school attorney and school board. Make sure your policy does not violate any current laws, policies or ordinances.

 

6. Introduce the policy to the community. Every team member should be tasked with reaching out to different stakeholder groups, says Anderson. It’s important to be open and transparent.

 

7. Conduct periodic reviews. Your new social media policy should be “a living document that is revisited often.”

 

Gust MEES:

 

8. teachers and Educators need to learn the basics of #itsecurity also to understand why those 7 points were created, check out also:

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 


Via Ana Cristina Pratas, Gust MEES
more...
No comment yet.
Rescooped by Dominique-Alain JAN from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | Technology Enhanced Learning & ePortfolio | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
more...
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD