21st Century Tools for Teaching-People and Learners
103.0K views | +0 today
Follow
21st Century Tools for Teaching-People and Learners
21st Century Tools to help teaching-people and learners to achieve "BETTER" their tasks...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

DroidSheep Guard - Applications Android - CyberSecurity

DroidSheep Guard - Applications Android - CyberSecurity | 21st Century Tools for Teaching-People and Learners | Scoop.it
DroidSheep Guard protects your phone from DroidSheep, Faceniff & other hijackers DroidSheep Guard protects your phone from Tools like DroidSheep, Faceniff and other Se...
Gust MEES's insight:

 

Awareness and Protection!!!


Gust MEES's curator insight, April 14, 2013 9:22 AM

 

Awareness and Protection!!!

 

Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Mobile Security Firm Analyzes 1.7 Million Android Apps [Infographic]

Mobile Security Firm Analyzes 1.7 Million Android Apps [Infographic] | 21st Century Tools for Teaching-People and Learners | Scoop.it
Mobile security firm TrustGo Mobile recently released a report that examined the Android threat landscape across 175 Android markets and 1.7 million Android apps.

 

Read more, a MUST:

http://www.securityweek.com/mobile-security-firm-analyzes-17-million-android-apps?utm_source=dlvr.it&utm_medium=twitter

 

No comment yet.
Rescooped by Gust MEES from ICT Security Tools
Scoop.it!

Imation’s USB Mobile Desktops: Secure Portable Workspace Environments

Imation’s USB Mobile Desktops: Secure Portable Workspace Environments | 21st Century Tools for Teaching-People and Learners | Scoop.it
Imation’s portable USB desktops transform any computer into an IT-managed workstation, so workers can take all their data, applications and systems with them, securely and reliably.

 

 

 

 

 

Read more:

http://www.imation.com/en-EU/Mobile-Security/Mobile-Security-Products/Secure-Mobile-Workspace/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD is both an opportunity and a threat

BYOD is both an opportunity and a threat | 21st Century Tools for Teaching-People and Learners | Scoop.it
"iPhones, iPads, Androids, Tablets are pouring into organizations. In today's BYOD culture, AirTight often sees 3 times as many unmanaged personal devices in a customer's airspace than corporate devices.

 

===> The key to keeping your network secure is to manage those devices." <===

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

F-Secure - Protection - Free Anti-Theft for Mobile

F-Secure - Protection - Free Anti-Theft for Mobile | 21st Century Tools for Teaching-People and Learners | Scoop.it

Anti-Theft is an application for your mobile phone that provides a great way to protect it if it gets lost or stolen – and it’s FREE!

 

 

 


This is what you get:


- Easy to install and use


- Protects your confidential information against loss or theft


- Helps you locate your phone

 

Read more...

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Video: The expanded threat landscape

Video: The expanded threat landscape | 21st Century Tools for Teaching-People and Learners | Scoop.it
SC Magazine has various news articles and information for IT security professionals.

 

Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The next step in #BYOD #security

The next step in #BYOD #security | 21st Century Tools for Teaching-People and Learners | Scoop.it

The explosion in development and adoption of smartphones and tablets for both personal and business use in the past two years is both a blessing and a curse to IT departments globally.

 

Known as the Bring Your Own Device (BYOD) phenomenon, on one hand, there is an opportunity for greatly increased productivity and decreased costs.

 

===> On the other, there are increased security risks, management issues and even data and device ownership and governance issues. <===

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Bring your own device scheme launches at school | ZDNet

Bring your own device scheme launches at school | ZDNet | 21st Century Tools for Teaching-People and Learners | Scoop.it
BYOD is now being trialed at a U.S. school as a pilot program.

 

Bring your own device (BYOD) schemes remain contentious in both educational and business networks.

 

In schools, who pays for theft, loss or damage? Can schools force parents to pay for devices as well as the yearly bill of school uniform and text books?

 

Are parents happy with the prospect of their children taking expensive products in to school, where damage is possible?

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Yvic Le Scouezec, IT Sr Manager, CISCO : BYOD, attention aux sauvegardes - Global Security Mag Online

Depuis 2009, Cisco a choisi de laisser libres ses collaborateurs de choisir leurs propres outils de communication. Cette décision a été prise afin de répondre aux désirs des employés mais aussi de mieux contrôler les coûts tout en augmentant l’offre de service.

 

Trois ans après, Yvic Le Scouezec, IT Sr Manager, CISCO tire les enseignements de ce choix s’il rencontre des problèmes au niveau des sauvegardes, il ‘ne reste pas moins que les gains en matière de productivité sont importants.

No comment yet.
Scooped by Gust MEES
Scoop.it!

This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD - Cult of Mac

This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD - Cult of Mac | 21st Century Tools for Teaching-People and Learners | Scoop.it
This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD [Interview]Cult of MacOn the front lines of the Bring-Your-Own-Device (BYOD) movement, she's created an iPad class approved by the New York State Continuing Legal Education Board.
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD : Quels enjeux pour l’entreprise et comment définir le périmètre

« Quand le monde du grand public s’invite dans le monde professionnel » Le BYOD (Bring Your Own Device), tendance à fusionner l’utilisation de son (...)...
No comment yet.
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

20 security and privacy apps for Androids and iPhones

20 security and privacy apps for Androids and iPhones | 21st Century Tools for Teaching-People and Learners | Scoop.it
Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data.

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more, a MUST:

http://www.csoonline.com/slideshow/detail/66493/20-security-and-privacy-apps-for-Androids-and-iPhones-

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cisco: The Biggest Mobile BYOD Deployment Around? [Slides]

Cisco: The Biggest Mobile BYOD Deployment Around? [Slides] | 21st Century Tools for Teaching-People and Learners | Scoop.it

There are 50,538 smartphones and tablets in use at Cisco, which has 71,825 employees. Not only does that already comprise a ratio of one device per 1.4 employees, said Lance Perry, vice-president of IT customer strategy and success for Cisco, during an excellent presentation at the Consumerization of IT in the Enterprise (CITE) conference in San Francisco on Monday. But the 50,000+ device figure is also an increase of 52% from just 12 months earlier.

 

Read more: the practice...

http://www.forbes.com/sites/sap/2012/03/05/cisco-the-biggest-mobile-byod-deployment-around/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

security in the age of mobility [pdf]

” Mobile devices can expose users’ and
organizations’ valuable data to unauthorized people if
necessary precautions are not taken.

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Security, Privacy and Legal Implications of BYOD

The Security, Privacy and Legal Implications of BYOD | 21st Century Tools for Teaching-People and Learners | Scoop.it
The Security, Privacy and Legal Implications of BYOD


Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable.

 

Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. Many companies are having to play catch-up to control these risks.

 

===> This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations. <===

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOT: Bring Your Own Token

BYOT: Bring Your Own Token | 21st Century Tools for Teaching-People and Learners | Scoop.it
SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization.

 

At the click of a button users can have their authentication token as an SMS on a mobile, an app on a smartphone or tablet, or a soft token on a laptop – with the ability to swap between devices at will.

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How to create a BYOD policy

How to create a BYOD policy | 21st Century Tools for Teaching-People and Learners | Scoop.it
A BYOD policy can eliminate a lot of the problems associated with bring your own device programs. Learn best practices for creating a BYOD policy.

 

BYOD isn’t a synonym for “free for all.” Once an organization decides to let employees use their own mobile devices and PCs for work, it must put a BYOD policy in place to control this usage.

 

===> Requires Free Membership to View

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Mobility's Situational Unawareness

Mobility's Situational Unawareness | 21st Century Tools for Teaching-People and Learners | Scoop.it
Ignorance, as those in IT security know, is not bliss.

 

And, two new studies when viewed together show that consumer ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk.

 

===> Many organizations unduly place themselves at risk by allowing access to their computers by mobile devices used by employees who download apps without understanding their consequences. That doesn't seems like a smart information risk management policy; actually, it doesn't seem like a policy at all. <===

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD Infographic: For security it's not a pretty picture

BYOD Infographic: For security it's not a pretty picture | 21st Century Tools for Teaching-People and Learners | Scoop.it
As ESET's BYOD Infographic shows, BYOD is no LOL matter, bringing with it some serious risks to company networks and data. Based on an ESET Harris Interactive survey.

 

Another BYOD risk factor is the practice of letting someone else use the device. This could be "just" a family member or friend but it introduces the possibility of that person gaining access to the company network or sensitive company data stored on the device.

 

===> Furthermore, if this "other person" is not trained in safe computing practices there is a serious risk of them getting the device infected or compromised. <===

No comment yet.
Scooped by Gust MEES
Scoop.it!

Creating a Robust and Safe BYOD Program

Creating a Robust and Safe BYOD Program | 21st Century Tools for Teaching-People and Learners | Scoop.it

Network Security and More


Don Knezek, executive director of the International Society for Technology in Education (ISTE), notes that starting a BYOD program means making adjustments when it comes to security, especially protecting a district’s proprietary and secure data. That function, he says, used to be handled by an effective firewall that kept out unwanted users and their devices.

 

“Nowadays, you have to have a layer past the firewall that we didn’t have to deal with when we simply said no to user-owned devices,” he says. “Now all of a sudden, you have multiple points of entry at different levels of access, and that requires more diligence.”

One key to maintaining adequate security, Knezek and other experts say, is to have multiple networks: one for Wi-Fi traffic, one for district business and for other secure information for teachers and administrators only, and one for students and outside users of the district’s Web site.

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

The Security, Privacy and Legal Implications of BYOD

The Security, Privacy and Legal Implications of BYOD | 21st Century Tools for Teaching-People and Learners | Scoop.it

Employees are increasingly using (and demanding to use) their personal devices to store and process their employer's data, and connect to their network...

 

Even if cost-savings is not the goal, most companies believe that processing of company data on employee personal devices is inevitable and unavoidable. Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk.

 

Many companies are having to play catch-up to control these risks.

 

This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations.

 

Take the example of company-owned laptop issued to an employee. When it comes to security, the company can:


- determine and limit the type of devices that can be used;


- implement minimum system requirements and configurations;


- install security-related software to the device;
encrypt company data on the device;


- apply security patches;


- monitor the use of the device to detect misuse, hacking or malware;


- dictate how the device connects to the company’s network;


- install and update anti-virus software;


- provide support for the device; and
obtain/access the device for purposes of an investigation (because the company owns the device).

 

No comment yet.