ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Managing Mobile Privacy | Security Intelligence Blog [Infographic]

Managing Mobile Privacy | Security Intelligence Blog [Infographic] | ICT Security-Sécurité PC et Internet | Scoop.it
Trend Micro infographic on how users can manage their privacy while using their mobile devices.
Gust MEES's insight:

A MUST have Infographic to understand the risks!!!
SHOULD be pinned in any schools!


Gust MEES's curator insight, February 4, 2013 8:13 AM

A MUST have Infographic to understand the risks!!!

SHOULD be pinned in any schools!

 

Nqobile Martha's curator insight, May 29, 2014 9:05 AM
PRIVACY AND ICT The whys and wherefores of privacy

Privacy is a sensitive subject to which people attach great importance. The only problem is that they do not know exactly why. Still, if it is so important then it is also necessary to establish why that is the case. It is therefore the task of ethicists to clarify the relevant theoretical arguments and practical implications.

Any topics that touch on privacy, such as the electronic files on patients (efp) and cameras in public spaces therefore soon become topics of heated social and political debate. People appreciate the advantages of new information technology but are at the same time alarmed to realize that so much is known about them. It is often emotions that play a decisive role because the relevant arguments are difficult to formulate not to mention weigh up.

Nqobile Martha's curator insight, May 29, 2014 9:08 AM
PRIVACY AND ICT The whys and wherefores of privacy

Privacy is a sensitive subject to which people attach great importance. The only problem is that they do not know exactly why. Still, if it is so important then it is also necessary to establish why that is the case. It is therefore the task of ethicists to clarify the relevant theoretical arguments and practical implications.

Any topics that touch on privacy, such as the electronic files on patients (efp) and cameras in public spaces therefore soon become topics of heated social and political debate. People appreciate the advantages of new information technology but are at the same time alarmed to realize that so much is known about them. It is often emotions that play a decisive role because the relevant arguments are difficult to formulate not to mention weigh up.

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [Infographic]

Why You Should Care About Mobile Security [Infographic] | ICT Security-Sécurité PC et Internet | Scoop.it

 

Article by Neil DuPaul

 

The BYOD revolution. You’ve heard of it, you know it’s coming, some believe it’s already here. Is it inevitable? Will it change the way we do business? No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security!

 

Read more:

http://www.infosecisland.com/blogview/22567-Why-You-Should-Care-About-Mobile-Security-An-Infographic.html?utm_source=dlvr.it&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | ICT Security-Sécurité PC et Internet | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

BYOD-2012 Mobile Device Security Policy Survey

BYOD-2012 Mobile Device Security Policy Survey | ICT Security-Sécurité PC et Internet | Scoop.it
nCircle is the leading provider of automated security and compliance auditing solutions.

 

Gust MEES: while using e-Learning, m-Learning and "Bring Your Own Device" (Hashtag on Twitter = #BYOD) we need to know the dangers, risks and ALSO that NO DEVICE is perfect! ANY device containing a computer, even a mini-computer is vulnerable! Mini-computer? YES, also a smartphone with what ever OS is vulnerable as it is more a computer than a phone!

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

                   ===> Be aware of the malware!!! <===

 

Read more, a MUST:

http://www.ncircle.com/index.php?s=resources_surveys_Mobile-Security-Policy-2012

 

No comment yet.