Security
3 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Julien
Scoop.it!

The CEO's Manual on Cyber Security: James Scott: 9780989253598: Amazon.com: Books

The CEO's Manual on Cyber Security

~ James Scott (author) More about this product
List Price: $14.95
Price: $13.26
You Save: $1.69 (11%)
The CEO's Manual on Cyber Security [James Scott] on Amazon.com. *FREE* shipping on qualifying offers.
more...
No comment yet.
Rescooped by Julien from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

F-Secure: Mobile Threat Report Q3-202012 [pdf]

THIS REPORT DISCUSSES THE MOBILE THREAT LANDSCAPE AS SEEN IN THE THIRD QUARTER OF 2012, AND INCLUDES STATISTICS AND DETAILS OF THE MOBILE THREATS THAT F-SECURE RESPONSE LABS HAVE SEEN AND ANALYZED DURING THAT PERIOD. THE DATA PRESENTED IN THIS REPORT WAS LAST UPDATED ON 30 SEPTEMBER 2012.

 


Via Gust MEES
more...
No comment yet.
Rescooped by Julien from ICT Security-Sécurité PC et Internet
Scoop.it!

FBI changed its priorities to focus on cyber security as "a national security threat"

FBI changed its priorities to focus on cyber security as "a national security threat" | Security | Scoop.it
Internet security has changed the bureau’s priorities on national security

 

INFOSEC: CYBER CRIME is fast becoming a threat to surpass terrorism, the US Federal Bureau of Investigation (FBI) said on Wednesday,

 

===> announcing that it has changed its priorities to focus on cyber security as "a national security threat". <===

 

 


Via Gust MEES
more...
Gust MEES's curator insight, April 24, 2013 1:35 PM

 

INFOSEC: CYBER CRIME is fast becoming a threat to surpass terrorism, the US Federal Bureau of Investigation (FBI) said on Wednesday, announcing that it has changed its priorities to focus on cyber security as "a national security threat".

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Gust MEES's curator insight, April 24, 2013 4:55 PM

 

INFOSEC: CYBER CRIME is fast becoming a threat to surpass terrorism, the US Federal Bureau of Investigation (FBI) said on Wednesday, announcing that it has changed its priorities to focus on cyber security as "a national security threat".

 

Learn more:

 

https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Rescooped by Julien from 21st Century Learning and Teaching
Scoop.it!

10 security best practice guidelines for businesses

10 security best practice guidelines for businesses | Security | Scoop.it
Businesses need extreme security measures to combat extreme threats. Here are ten best practices that provide defense against the majority of all security threats.

Via Gust MEES
more...
Gust MEES's curator insight, March 4, 2013 3:59 PM

 

                      ===> An educated user is a safer user. <===

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Gust MEES's curator insight, March 4, 2013 4:04 PM

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/