21st Century Tools for Teaching-People and Learners
103.0K views | +0 today
Follow
21st Century Tools for Teaching-People and Learners
21st Century Tools to help teaching-people and learners to achieve "BETTER" their tasks...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Bring your own device scheme launches at school | ZDNet

Bring your own device scheme launches at school | ZDNet | 21st Century Tools for Teaching-People and Learners | Scoop.it
BYOD is now being trialed at a U.S. school as a pilot program.

 

Bring your own device (BYOD) schemes remain contentious in both educational and business networks.

 

In schools, who pays for theft, loss or damage? Can schools force parents to pay for devices as well as the yearly bill of school uniform and text books?

 

Are parents happy with the prospect of their children taking expensive products in to school, where damage is possible?

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Yvic Le Scouezec, IT Sr Manager, CISCO : BYOD, attention aux sauvegardes - Global Security Mag Online

Depuis 2009, Cisco a choisi de laisser libres ses collaborateurs de choisir leurs propres outils de communication. Cette décision a été prise afin de répondre aux désirs des employés mais aussi de mieux contrôler les coûts tout en augmentant l’offre de service.

 

Trois ans après, Yvic Le Scouezec, IT Sr Manager, CISCO tire les enseignements de ce choix s’il rencontre des problèmes au niveau des sauvegardes, il ‘ne reste pas moins que les gains en matière de productivité sont importants.

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Carnegie Cyber Academy - An Online Safety site and Games for Kids

The Carnegie Cyber Academy - An Online Safety site and Games for Kids | 21st Century Tools for Teaching-People and Learners | Scoop.it
The Carnegie Cyber Academy website provides online safety information and Carnegie Cadets: The MySecureCyberspace Game, an educational game that teaches kids about internet safety.
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

The Security, Privacy and Legal Implications of BYOD

The Security, Privacy and Legal Implications of BYOD | 21st Century Tools for Teaching-People and Learners | Scoop.it

Employees are increasingly using (and demanding to use) their personal devices to store and process their employer's data, and connect to their network...

 

Even if cost-savings is not the goal, most companies believe that processing of company data on employee personal devices is inevitable and unavoidable. Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk.

 

Many companies are having to play catch-up to control these risks.

 

This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations.

 

Take the example of company-owned laptop issued to an employee. When it comes to security, the company can:


- determine and limit the type of devices that can be used;


- implement minimum system requirements and configurations;


- install security-related software to the device;
encrypt company data on the device;


- apply security patches;


- monitor the use of the device to detect misuse, hacking or malware;


- dictate how the device connects to the company’s network;


- install and update anti-virus software;


- provide support for the device; and
obtain/access the device for purposes of an investigation (because the company owns the device).

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Protecting Your MySQL Databases from Hacks [video]

McAfee's Slavik Markovich and Sean Roth demonstrate how MySQL databases — sitting beneath web applications — need protection from hacks and attacks.
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD : Quels enjeux pour l’entreprise et comment définir le périmètre

« Quand le monde du grand public s’invite dans le monde professionnel » Le BYOD (Bring Your Own Device), tendance à fusionner l’utilisation de son (...)...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Malicious Web Apps: How to Spot Them, How to Beat Them

Malicious Web Apps: How to Spot Them, How to Beat Them | 21st Century Tools for Teaching-People and Learners | Scoop.it
These days, a Web app can be malware. Here’s what you need to know about this emerging threat, and what to watch for.

 

 

Tim Keanini, CTO of nCircle, says cyberattackers are talented, creative developers who are motivated to find innovative ways to part you from your money or information.

 

Typically, a malicious Web app is a form of Trojan horse: The app claims to be something else--and it may in fact run some legitimate utility or application--but once you click it, it runs malicious code in the background that may compromise your system or secretly download other malicious payloads from the Internet.
Speaking of Web apps, Camp warns, "While they allow increased functionality within the browser, users should be aware of how deeply into your system they may be able to reach."

 

===> Don't assume that you're safe if you avoid Microsoft Windows. Web apps do frequently target specific vulnerabilities, and Windows is often a primary focus, but Web apps--both benign and malicious--are fundamentally platform-agnostic. <===

 

Gust MEES: check out also my #itsecurity #tutorials (FREE courses) here

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

- http://gustmeesen.wordpress.com/2012/01/05/pc-security-howto-secure-my-pc/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD Infographic: For security it's not a pretty picture

BYOD Infographic: For security it's not a pretty picture | 21st Century Tools for Teaching-People and Learners | Scoop.it
As ESET's BYOD Infographic shows, BYOD is no LOL matter, bringing with it some serious risks to company networks and data. Based on an ESET Harris Interactive survey.

 

Another BYOD risk factor is the practice of letting someone else use the device. This could be "just" a family member or friend but it introduces the possibility of that person gaining access to the company network or sensitive company data stored on the device.

 

===> Furthermore, if this "other person" is not trained in safe computing practices there is a serious risk of them getting the device infected or compromised. <===

No comment yet.
Scooped by Gust MEES
Scoop.it!

Creating a Robust and Safe BYOD Program

Creating a Robust and Safe BYOD Program | 21st Century Tools for Teaching-People and Learners | Scoop.it

Network Security and More


Don Knezek, executive director of the International Society for Technology in Education (ISTE), notes that starting a BYOD program means making adjustments when it comes to security, especially protecting a district’s proprietary and secure data. That function, he says, used to be handled by an effective firewall that kept out unwanted users and their devices.

 

“Nowadays, you have to have a layer past the firewall that we didn’t have to deal with when we simply said no to user-owned devices,” he says. “Now all of a sudden, you have multiple points of entry at different levels of access, and that requires more diligence.”

One key to maintaining adequate security, Knezek and other experts say, is to have multiple networks: one for Wi-Fi traffic, one for district business and for other secure information for teachers and administrators only, and one for students and outside users of the district’s Web site.

No comment yet.
Scooped by Gust MEES
Scoop.it!

This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD - Cult of Mac

This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD - Cult of Mac | 21st Century Tools for Teaching-People and Learners | Scoop.it
This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD [Interview]Cult of MacOn the front lines of the Bring-Your-Own-Device (BYOD) movement, she's created an iPad class approved by the New York State Continuing Legal Education Board.
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Why Antivirus Protection Is Key to Computer Security

Why Antivirus Protection Is Key to Computer Security | 21st Century Tools for Teaching-People and Learners | Scoop.it
To go online is to live dangerously. Aside from the risk of viruses, there are also worms and Trojan horses -- all trying to find an unsecured computer upon which to work their mischief.

 

Check out also:

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

- http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

- http://gustmeesen.wordpress.com/2012/01/05/pc-security-howto-secure-my-pc/

No comment yet.
Rescooped by Gust MEES from Social Media and its influence
Scoop.it!

Social Medias and its Influence: Adventure with IT-Security Tweeps on Twitter

Social Medias and its Influence: Adventure with IT-Security Tweeps on Twitter | 21st Century Tools for Teaching-People and Learners | Scoop.it

Hi, First of all let me tell you that on the beginning when I joined Twitter I really wasn’t a friend of it as I didn’t see its advantages. I am an ICT Course Instructor and also an author who has written a lot of articles, blogs, tutorials and courses who were read +/- 4 million times in total...

 

Here my #SoMe adventure; read more... "A True Story"...

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

How-To make sure that my shared links are not malicious?

How-To make sure that my shared links are not malicious? | 21st Century Tools for Teaching-People and Learners | Scoop.it

#education #edchat #edtech How-To make sure that my shared links are not malicious?

 

Check my #scoopit http://www.scoop.it/t/ict-security-tools?tag=urlQuery

 

No comment yet.