21st Century Learning and Teaching
585.8K views | +7 today
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Security Education'. Clear
Scooped by Gust MEES
Scoop.it!

Backups | Get Safe Online

Backups | Get Safe Online | 21st Century Learning and Teaching | Scoop.it

The information held on your computer may be irreplaceable. Regularly backing up your data will ensure that you have more than one copy.

 

- Ensure that all your important data is backed up regularly to a safe place.


- Ensure that your backed up data will always be retrievable when you need it.

 


The Risks


- Hardware failure (for example, hard drive failure is a frequent occurrence).


- Accidental file deletion.


- Theft.


- Fire, flood, accidental damage.


- Catastrophic virus or spyware infections.


- File deletion during operating system upgrades.

 

Read more:

http://www.getsafeonline.org/protecting-your-computer/Backups/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

handysektor | Sicherheit im mobilen Netz

handysektor | Sicherheit im mobilen Netz | 21st Century Learning and Teaching | Scoop.it
Die Internetseite www.handysektor.de ist ein werbefreies Informationsangebot für Jugendliche. Die sichere Nutzung von WLAN, Mobiltelefon, Notebook, Game Konsole, Bluetooth steht dabei im Vordergrund.

 

Mehr erfahren:

http://www.handysektor.de/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Waterhole Attack [Infographic]

The group behind the now infamous Hydraq (Aurora) targeted attacks continues to be very active.

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security Education | Security Awareness | Trustwave

Security Education | Security Awareness | Trustwave | 21st Century Learning and Teaching | Scoop.it
Provide your staff with the education they need to properly handle sensitive data in order to ensure your business and customers are protected and to fulfill compliance requirements...

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOVhttp://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/securite-pc-et-internet

 

 

 

Read more:

https://www.trustwave.com/security-education-services/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD research again exposes security fears

BYOD research again exposes security fears | 21st Century Learning and Teaching | Scoop.it
A new joint study from KnowBe4 and ITIC (Information Technology Intelligence Consulting) has revealed that nearly three quarters of businesses which approve of BYOD have nothing specific in place to ensure security.

 

Specifically, 71% of BYOD-friendly corporations polled had no specific procedures in place to support BYOD development, which is an extremely worrying statistic.

 

The research, which surveyed 550 companies globally throughout July and August, was described as a “wake-up call” by ITIC principal analyst Laura DiDio.

 

Research from connectivity experts iPass revealed a similar opacity with enterprise device responsibility, noting at the time: “A balance needs to be found between issuing IT-controlled smartphones and letting a certain subset of employees own the responsibility for their own devices”.

 

Gust MEES: read also my FREE course about it here https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more:

http://www.appstechnews.com/news/2012/sep/07/byod-research-again-exposes-security-fears/?utm_source=dlvr.it&utm_medium=twitter

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

As BYOD Trend Grows So Do Malware Attacks

As BYOD Trend Grows So Do Malware Attacks | 21st Century Learning and Teaching | Scoop.it
As BYOD Trend Grows So Do Malware Attacks
The report found that the majority of employee’s devices did not have any form of security software loaded nor were company materials protected.

 

The BYOD concept has been a growing trend for some years now as employees become more accustomed to using their own mobile computing devices in their jobs, and accessing corporate assets.

The rapid adoption of high end smartphones and tablets including iPhones, iPads and Android devices along with the number of easily accessible apps is driving this concept forward. Cloud based services, accessible from almost anywhere, are also a key factor.

The ‘Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017’ report report from Juniper found that while this trend can bring productivity benefits to businesses, it also poses potential security risks.

 

In particular, the report found that the majority of employee’s phones and smart devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions.

 

The war on cybercrime therefore continues for many organizations and especially their IT departments and CISOs. The total number of Computer viruses, trojans and web attacks is growing at their fastest pace in four years.

 

Read more, a MUST:

http://www.infosecisland.com/blogview/22364-As-BYOD-Trend-Grows-So-Do-Malware-Attacks.html?utm_source=dlvr.it&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

WiFi-Hotspots security and privacy: Sophos Project Warbike

Sophos's cycling security expert took to the streets of London to see how many unsecured Wi-Fi hotspots he could find. Watch our video to see what we discove...

 

Gust MEES: see the dangers of WiFi and Hotspots as also my Tips to surf secure here:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Watch the video here:

http://www.youtube.com/watch?v=NaPdSiX0Aho

 

David's curator insight, March 19, 2014 6:30 PM

amazing wardriving

Zhao KQiang's curator insight, March 27, 2014 7:12 AM

why there are so many unsecured wi-fi hotspots? when we connect free wifi, we should have the awareness  to ask ourselves it is security or not. the companies owner should check the security of wifi setting 

Scooped by Gust MEES
Scoop.it!

Infographic: Uneducated Employees and Their Seven Deadly Sins

Infographic: Uneducated Employees and Their Seven Deadly Sins | 21st Century Learning and Teaching | Scoop.it
Organizations that do not invest in security education for their employees put themselves at risk. Trustwave's infographic outlines how.

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOVhttp://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/securite-pc-et-internet

 

 Check out also "Security Education Services" from Trustwave:

- https://www.trustwave.com/security-education-services/

 

 

 

 

Read more:

https://www.trustwave.com/trustednews/2012/09/infographic-uneducated-employees-their-seven-deadly-sins

 

No comment yet.