21st Century Learning and Teaching
585.8K views | +0 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'BYOD-Security'. Clear
Scooped by Gust MEES
Scoop.it!

Mobile Anwender sind ein Sicherheitsrisiko | ICT | BYOD | eSkills | CyberSecurity

Mobile Anwender sind ein Sicherheitsrisiko | ICT | BYOD | eSkills | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
Der sorglose Umgang der Mitarbeiter mit mobiler Technologie gehört laut IDC neben Malware und Phishing-Attacken zu den häufigsten Risiken beim Thema Mobile Security in Unternehmen.


Zu den größten Sicherheitsrisiken aus Sicht der IT-Verantwortlichen zählen dabei Mobile Malware mit 42 Prozent, gefolgt von Phishing und Social Engineering mit 35 Prozent. Weitere 30 Prozent gaben an, dass das Fehlverhalten von Anwendern – vorsätzlich oder unabsichtlich – ein großes Risiko darstelle. Sie planen deshalb, die Mitarbeiter stärker für das Thema Mobile Security zu sensibilisieren. 
Dies soll vor allem durch Trainings der Anwender und IT-Mitarbeiter sowie Richtlinien zur sicheren Nutzung mobiler Endgeräte geschehen - wobei hier die Wünsche der IT-Verantwortlichen und der User teils sehr unterschiedlich sind.
.
Learn more / Mehr erfahren:
.
.
Gust MEES's insight:
Der sorglose Umgang der Mitarbeiter mit mobiler Technologie gehört laut IDC neben Malware und Phishing-Attacken zu den häufigsten Risiken beim Thema Mobile Security in Unternehmen.


Zu den größten Sicherheitsrisiken aus Sicht der IT-Verantwortlichen zählen dabei Mobile Malware mit 42 Prozent, gefolgt von Phishing und Social Engineering mit 35 Prozent. Weitere 30 Prozent gaben an, dass das Fehlverhalten von Anwendern – vorsätzlich oder unabsichtlich – ein großes Risiko darstelle. Sie planen deshalb, die Mitarbeiter stärker für das Thema Mobile Security zu sensibilisieren. 
Dies soll vor allem durch Trainings der Anwender und IT-Mitarbeiter sowie Richtlinien zur sicheren Nutzung mobiler Endgeräte geschehen - wobei hier die Wünsche der IT-Verantwortlichen und der User teils sehr unterschiedlich sind.
Learn more / Mehr erfahren:
No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware discovered that works when device is off | New Android trojan | Mobile Security

Malware discovered that works when device is off | New Android trojan | Mobile Security | 21st Century Learning and Teaching | Scoop.it
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.




Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


Gust MEES's insight:
This week in the world of Android saw news of a new site for those who want to fix their own gadgets, an easy way to run Android apps under Windows, and an Android trojan is out that works even when you think you're device is shut down.


Learn more:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Android


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security


No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Security / Smartphones sind AUCH Mini-Computer!

Mobile Security / Smartphones sind AUCH Mini-Computer! | 21st Century Learning and Teaching | Scoop.it

Mini-Computer? JA, sie haben richtig gehört (gelesen), Smartphones sind KEINE Telefone mehr, sondern Mini-Computer mit Telefon- und Internetanschluss. Dieses sollte allen Personen bewusst sein, d.h: Smartphones benötigen genauso wie Computer einen Sicherheitsschutz, sprich Antivirus-Programm

Gust MEES's insight:

Mini-Computer? JA, sie haben richtig gehört (gelesen), Smartphones sind KEINE Telefone mehr, sondern Mini-Computer mit Telefon- und Internetanschluss. Dieses sollte allen Personen bewusst sein, d.h: Smartphones benötigen genauso wie Computer einen Sicherheitsschutz, sprich Antivirus-Programm


No comment yet.
Scooped by Gust MEES
Scoop.it!

Most of the top 100 paid Android and iOS apps have been hacked | CyberSecurity | MobileSecurity | eSkills

Most of the top 100 paid Android and iOS apps have been hacked | CyberSecurity | MobileSecurity | eSkills | 21st Century Learning and Teaching | Scoop.it
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's insight:
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's curator insight, November 17, 2014 8:26 AM
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's curator insight, November 17, 2014 8:28 AM
97% of the top 100 paid Android apps and 87% of the top 100 paid Apple iOS apps have been hacked, according to Arxan Technologies.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Scooped by Gust MEES
Scoop.it!

How to Hack a Mobile App: It's Easier than You Think!

How to Hack a Mobile App: It's Easier than You Think! | 21st Century Learning and Teaching | Scoop.it
How hackers are attacking binary code and mobile app vulnerabilities, and what you can do about it.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


Gust MEES's insight:
How hackers are attacking binary code and mobile app vulnerabilities, and what you can do about it.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


No comment yet.
Scooped by Gust MEES
Scoop.it!

5 Essential Insights About Mobile Learning

5 Essential Insights About Mobile Learning | 21st Century Learning and Teaching | Scoop.it
As mobile learning becomes more common, district leaders are working hard to juggle nimble adaptation in a changing environment and the desire to get it right.


Learn more:



Gust MEES's insight:

Learn more:



No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD Pros and Cons in Education [Infographic]

BYOD Pros and Cons in Education [Infographic] | 21st Century Learning and Teaching | Scoop.it
The BYOD Pros and Cons in Education Infographic highlights many of the advantages and disadvantages to letting students use personal devices in the classrooms.


Learn more:



Gust MEES's insight:


The BYOD Pros and Cons in Education Infographic highlights many of the advantages and disadvantages to letting students use personal devices in the classrooms.


Learn more:



Monty Bell's curator insight, April 10, 2014 11:35 AM

A balanced discussion on a very contentious issue

Scooped by Gust MEES
Scoop.it!

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable

Cheap apps, lack of inbuilt security leaves mobile environment vulnerable | 21st Century Learning and Teaching | Scoop.it
A shake-up is coming to the mobile security industry, and it will happen when Google begins to secure its Android environment, David Duncan, CMO of Webroot, says.


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



Gust MEES's insight:


When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.


App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they're free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.


Learn more:


http://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free



No comment yet.
Scooped by Gust MEES
Scoop.it!

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What's About Privacy?

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What's About Privacy? | 21st Century Learning and Teaching | Scoop.it
. . WHAT Are Apps? [START Text from Wikipedia] A mobile app, short for mobile application, or just app, is application software designed to run on smartphones, tablet computers and other mobile dev...
Gust MEES's insight:


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's curator insight, March 12, 2014 6:25 PM


Learn more:


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

Jacqueline Taylor-Adams's curator insight, March 27, 2014 11:55 AM

We rescooped this article from our (the Urban Tech Fair's) Czar of Education, Bonnie Bracey Sutton who shared this thought provoking article. What say, ye?


______________________

Be part of the Access, Education, and Commerce movement, the Urban Tech Fair www.UrbanTechFair.org

Scooped by Gust MEES
Scoop.it!

When BYOD Equals Bring Your Own Malware

When BYOD Equals Bring Your Own Malware | 21st Century Learning and Teaching | Scoop.it
Lookout's analysis of the mobile threat landscape suggests businesses should focus on curbing risky online behavior.


Gust MEES's insight:


Learn more:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercriminals Abuse Mobile Applications to Launch DDOS Attacks

Cybercriminals Abuse Mobile Applications to Launch DDOS Attacks | 21st Century Learning and Teaching | Scoop.it
Distributed denial-of-service (DDOS) attack protection solutions provider Prolexic has published its Global DDOS Attack Report for the fourth quarter ...

 

“The prevalence of mobile devices and the widespread availability of downloadable apps that can be used for DDoS is a game changer,” explained Stuart Scholly, president of Prolexic. 

 

Malicious actors now carry a powerful attack tool in the palm of their hands, which requires minimal skill to use. Because it is so easy for mobile device users to opt-in to DDoS attack campaigns, we expect to see a considerable increase in the use of these attack tools in 2014,” Scholly added.

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile-Security

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile+Device+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Another Android “master key” bug revealed

BYOD: Another Android “master key” bug revealed | 21st Century Learning and Teaching | Scoop.it
The existence of another “master key” bug that can be used to push malware onto Android users has been publicly disclosed by Jay Freeman (a....
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Rescooped by Gust MEES from Social Media and its influence
Scoop.it!

Vorsicht: Tausende iPhone-Apps mit Sicherheitslücke

Vorsicht: Tausende iPhone-Apps mit Sicherheitslücke | 21st Century Learning and Teaching | Scoop.it
Security-SuperGAU für alle Nutzer von iPhones und iPads: Experten haben eine Lücke in iOS-Apps entdeckt, die es erlaubt, die komplette Kommunikation über fremde Server umzuleiten. Tausende Apps sollen betroffen sein.

 

Über HTTP Request Hijacking sollen sich Hacker in iOS-Apps einschleichen und so den Datentraffic über eigene Server umleiten können. Nach erfolgreichem Angriff soll die Umleitung dann permanent aktiv sein.

 

===> Einzige Abhilfe schafft ein Update oder eine Neuinstallation der App. <===

 

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Scooped by Gust MEES
Scoop.it!

Mobile botnets detected since 2010 [pdf] | MobileSecurity | CyberSecurity

Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


https://gustmees.wordpress.com/?s=twitter


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


Gust MEES's insight:

Learn more:


https://gustmees.wordpress.com/2014/03/05/often-asked-questions-are-there-cyber-security-dangers-with-apps-and-whats-about-privacy/


https://gustmees.wordpress.com/?s=twitter


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


No comment yet.
Scooped by Gust MEES
Scoop.it!

Five of the best (and free) Android security apps | eLeaderShip | eSkills | CyberSecurity | MobileSecurity

Five of the best (and free) Android security apps | eLeaderShip | eSkills | CyberSecurity | MobileSecurity | 21st Century Learning and Teaching | Scoop.it
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/



Gust MEES's insight:
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


No comment yet.
Scooped by Gust MEES
Scoop.it!

10 tips for securing your smartphone | eSkills | DigitalCitizenShip | CyberSecurity | MobileSecurity | CyberHygiene

10 tips for securing your smartphone | eSkills | DigitalCitizenShip | CyberSecurity | MobileSecurity | CyberHygiene | 21st Century Learning and Teaching | Scoop.it
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.




1. Always secure your smartphone with a password

2. Ensure that your device locks itself automatically

3. Install security software

4. Only download apps from approved sources

5. Check your apps' permissions

6. Don't miss operating system updates

7. Be wary of any links you receive via email or text message

8. Encrypt your smartphone

9. Turn off automatic Wi-Fi connection

10. Turn off Bluetooth and NFC when not in use


Read full article here:


https://nakedsecurity.sophos.com/2013/10/08/10-tips-for-securing-your-smartphone/


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


Gust MEES's insight:
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.


1. Always secure your smartphone with a password

2. Ensure that your device locks itself automatically

3. Install security software

4. Only download apps from approved sources

5. Check your apps' permissions

6. Don't miss operating system updates

7. Be wary of any links you receive via email or text message

8. Encrypt your smartphone

9. Turn off automatic Wi-Fi connection

10. Turn off Bluetooth and NFC when not in use


Read full article here:


https://nakedsecurity.sophos.com/2013/10/08/10-tips-for-securing-your-smartphone/


Learn more:


https://gustmees.wordpress.com/2014/11/25/digital-citizenship-social-media-and-privacy/


Elizabeth Milovidov's curator insight, December 1, 2014 9:24 AM

Is your phone secure?  Read these 10 tips for guidance.

Scooped by Gust MEES
Scoop.it!

How Attackers Could Gain Remote Control over Most Smartphones | MIT Technology Review

How Attackers Could Gain Remote Control over Most Smartphones | MIT Technology Review | 21st Century Learning and Teaching | Scoop.it
A system designed to let carriers remotely install software on phones, or change their settings without a user noticing, is open to abuse.
Gust MEES's insight:

A system designed to let carriers remotely install software on phones, or change their settings without a user noticing, is open to abuse.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage | 21st Century Learning and Teaching | Scoop.it
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:



Gust MEES's insight:
  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Gust MEES's curator insight, July 21, 2014 9:31 AM
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:


Scooped by Gust MEES
Scoop.it!

BYOD | Mobile Bots Grow 1,000% in 2013

The number of bad bots has grown exponentially in recent years, driving poor internet performance for individuals and the loss of control over connected devices; wholesale theft of online intellectual property, content and data; unnecessarily high bandwidth fees; and compromised websites that are otherwise key to mission-critical functions. In fact, bad bots almost doubled as a percentage of all web traffic over the course of 2013, from 12.25% to 23.6%. And the number of mobile bots is up a staggering 1,000%.


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security



Gust MEES's insight:


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security




Scooped by Gust MEES
Scoop.it!

Une belle faille de sécurité Android concerne un milliard de terminaux

Une belle faille de sécurité Android concerne un milliard de terminaux | 21st Century Learning and Teaching | Scoop.it

Le mécanisme de mise à jour d’Android souffre d’une importante faille de sécurité. Selon une étude menée à l’université de l’Indiana et chez Microsoft Research, plusieurs vulnérabilités critiques existent au sein du système de permissions gérant les nombreuses versions de l’OS mobile.


En faisant croire qu'elle avait jusque-là tous les droits, une application malveillante pourrait, après la mise à jour, accéder à toutes les données personnelles.


Présente dans toutes les versions officielles d’Android, cette faille menace potentiellement plus d’un milliard de smartphones et de tablettes.


Gust MEES's insight:


Présente dans toutes les versions officielles d’Android, cette faille menace potentiellement plus d’un milliard de smartphones et de tablettes.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacked EA Server Used to Host Apple Phishing Page

Hacked EA Server Used to Host Apple Phishing Page | 21st Century Learning and Teaching | Scoop.it
Apple phishing scams are not uncommon, but phishing pages hosted on the website of a major company are certainly worth looking at. Experts have found ...


“The mere presence of old software can often provide sufficient incentive for a hacker to target one system over another, and to spend more time looking for additional vulnerabilities or trying to probe deeper into the internal network.”

The problem with phishing pages hosted on the web servers of reputable companies is that it’s less likely that they’ll be flagged. Furthermore, some users might be tricked into thinking that the pages are legit considering that they’re on a trusted domain.

In this case, the attackers could have made up a story about a collaboration between EA and Apple and that would have truly made the phish efficient.

Gust MEES's insight:


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Phishing


No comment yet.
Scooped by Gust MEES
Scoop.it!

Studie: BYOD-Trend hält an - Sicherheitskultur weiter mangelhaft

Studie: BYOD-Trend hält an - Sicherheitskultur weiter mangelhaft | 21st Century Learning and Teaching | Scoop.it
datensicherheit,de - Studie von Absolute Software: BYOD-Trend hält an, aber Sicherheitskultur bleibt mangelhaft.
Gust MEES's insight:


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Security Resolutions for the New Year

Mobile Security Resolutions for the New Year | 21st Century Learning and Teaching | Scoop.it
Here are some resolutions you can easily keep, and you will be glad you did! Our 5-point checklist to help you make essential improvements to your mobile security in 2014.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile+Device+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Byod : un risque et une opportunité en même temps

Byod : un risque et une opportunité en même temps | 21st Century Learning and Teaching | Scoop.it
De plus en plus d’employés emmènent leurs appareils au travail et se connectent sur le réseau de l’entreprise.
Gust MEES's insight:

 

Learn more:

 

https://www.cases.lu/fr/byod-un-risque-et-une-opportunite-en-meme-temps.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Effective Apps And Web Tools For BYOD Classrooms

Effective Apps And Web Tools For BYOD Classrooms | 21st Century Learning and Teaching | Scoop.it
I'd recommend using this chart as a jumping off point to new adventures in learning in BYOD classrooms and beyond!
Gust MEES's insight:

 

Learn more about BYOD:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Dr Pam Hill's curator insight, November 1, 2013 4:04 PM

Great ideas for BYOD PD sessions.  I will be using these ideas!

Elena Evtukh's curator insight, November 8, 2013 11:43 PM

Эффективные мобльные приложения и сетевые ресурсы для BYOD класса.

В - bring (принеси)

Y - your (свое)

O - own (собственное)

D - device (устройство)

Melissa Marshall's curator insight, November 11, 2013 2:24 AM

Great graphic for when you are unsure as to what your kids may have access to.