Does your child bring a handheld device to school to access the Internet?
Read more:
http://info.uknowkids.com/blog/bid/234136/BYOD-Bring-Your-Own-Device-School-Policy
Get Started for FREE
Sign up with Facebook Sign up with X
I don't have a Facebook or a X account
Your new post is loading...
Your new post is loading...
Current selected tag: 'BYOD-Security'. Clear
Does your child bring a handheld device to school to access the Internet?
Read more: http://info.uknowkids.com/blog/bid/234136/BYOD-Bring-Your-Own-Device-School-Policy
Bring your own device (BYOD) is gaining more and more ground within enterprises, as employees are increasingly using their personal smartphones and tablets to check email, edit documents and do other work.
Read more, a MUST:
Do you always turn WiFi off on your smartphone before leaving the house or work? You might think there's no harm in having WiFi turned on but not connected to a network, but that's not necessarily the case.
A wireless device goes through a discovery process in which it attempts to connect to an available wireless network. This may either be ‘passive’ - listening for networks which are broadcasting themselves - or ‘active’ - sending out probe request packets in search of a network to connect to.
Most devices use both passive and active discovery in an attempt to connect to known/preferred networks. So it's very likely that your smartphone is broadcasting the names (SSIDs) of your favourite networks for anyone to see.
===> An ‘evil twin’ attack could even accomplish this without needing any knowledge of your WiFi password - very damaging for all of those who use mobile banking for instance! <===
Gust MEES: a MUST READ for anyone using m-Learning + "BYOD" and also any smartphone user...
Si 34% d’entreprises interdisent l’usage de terminaux personnels, elle sont également 55% à appliquer des règles strictes pour encadrer l’accès aux documents professionnels depuis ces appareils.
nCircle is the leading provider of automated security and compliance auditing solutions.
Gust MEES: while using e-Learning, m-Learning and "Bring Your Own Device" (Hashtag on Twitter = #BYOD) we need to know the dangers, risks and ALSO that NO DEVICE is perfect! ANY device containing a computer, even a mini-computer is vulnerable! Mini-computer? YES, also a smartphone with what ever OS is vulnerable as it is more a computer than a phone!
Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/
- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/
- http://www.scoop.it/t/ict-security-tools
- http://www.scoop.it/t/securite-pc-et-internet
- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free
===> Be aware of the malware!!! <===
Read more, a MUST: http://www.ncircle.com/index.php?s=resources_surveys_Mobile-Security-Policy-2012
Is IT becoming a consumer product?...
Most people are participating in rogue IT without even realizing it. By definition, rogue IT is the unmanaged hardware and software that employees bring into their offices, connect to employers’ networks and use for professional productivity on personal time. At first, it doesn’t sound so bad. By allowing employees to connect to the Wi-Fi with their own devices, companies avoid the cost of providing the hardware. But as we learned from the BYOD toolkit from CIO.gov, BYOD programs aren’t profitable if they are uncontrolled, because problems, like the ones we’ll discuss below, arise.
===> Rogue IT is innovative and efficient for workers, but it’s becoming a real problem for IT managers. Here are four trends that are shaking up IT: <===
Gust MEES: check out also my FREE course about it here - http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
Read more: http://www.statetechmagazine.com/article/2012/09/4-rogue-it-trends-watch-out
Gust MEES's comment,
September 9, 2012 3:54 PM
Bonsoir,
Merci pour avoir fait lke #rescoop de ma curation, mais: Quand on #rescoop un article d'un autre curateur on le fait à 100% et on ne fait pas de la censure sur le #scoopit de cet auteur !!! Le texte complet est sur cette curation, voici ce qui manque: "===> Rogue IT is innovative and efficient for workers, but it’s becoming a real problem for IT managers. Here are four trends that are shaking up IT: <=== Gust MEES: check out also my FREE course about it here - http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/" Et c'est l'article complet que je veux voir avec mes remarques personnelles, et rien d'autre !!! Si vous n'êtes pas d'accord avec mes remarques personnelles je vous conseille vivement d'effacer ce #scoopit (il est marqué avec mon nom !!!) et de prendre l'adresse originaire de le republier avec votre propre nom sans mes commentaires !!! J'espère que l'on s'est bien compris, autrement j'attends votre commentaire de retour !!! Bonne soirée, Gust
Stéphane Koch's comment,
September 10, 2012 2:24 AM
Cher Gust, la "curation de contenu" est basée sur la mise à disposition de contenus que l'on aura auparavant "éditorialisés", l'idée étant d'organiser et de structurer l'information afin d'en offrir une "meilleure" lisibilité. Scoopit offre, par son champs d'édition, la possibilité d’aménager/organiser l'information à sa convenance... Que l'on partage, ou repartage une info... Concernant spécifiquement cet article ont je me permets - gentiment - de rappeler que vous n'en êtes pas l'auteur. Et d'ajouter qu'il n'y avait aucune volonté de censure de ma part... La mention de votre nom fait référence à la source de ce partage, et ne vous indique en aucune cas comme étant une référence par rapport au contenu de cet article, sur lequel par ailleurs vous n'avez aucun droit de propriété, si ce n'est celui d'être justement mentionné comme source dudit partage. Ni ne vous engage juridiquement. Vous devriez plutôt prendre en compte que la mention de votre nom permet aux lecteurs de venir visiter votre propre scoopit et de s'y abonner le cas échéant, et au final d'en apprendre plus sur vous et les différents services que vous offrez... Donc s'il y avait eu une volonté de "censure" de ma part, j'aurais "rescoopé" directement l'article sans mention de l'origine de son partage, d'autant plus que dans le cas présent je n'ai pas altéré ou modifié le contenu de l'article lors de sa "réédition".
Bref, si vous n'aviez pas utilisé un ton aussi peu courtois, j'aurais accédé avec plaisir à votre demande... Je vais donc laisser les choses en l'état, étant donné que - comme mentionné précédemment - cela permettra non seulement aux lecteurs intéressés d'accéder à votre scoopit, mais aussi de lire votre commentaire, et par conséquent, ce que vous vouliez communiquer.... Voilà pour ce qui est de mon "commentaire de retour". Pour finir, je ne peux m'empêcher de "quoter" "2001: A Space Odyssey (1968)". Je pense que c'est tout à fait approprié à la situation ;) "Look Dave, I can see you're really upset about this. I honestly think you ought to sit down calmly, take a stress pill, and think things over."
The Norton Cybercrime Report is out for 2012! Cybercrime continues to have far-reaching effects and is increasingly a problem on mobile devices and in our social networks (where we seem to be less vigilant).
After surveying more than 13,000 consumers in 24 countries, the researchers found that the numbers of online adults increased by 20 percent from last year, and that cybercrime impacted just under ½ of them in the previous 12 months. The total direct consumer cost was calculated to be $110 billion, slightly down from last year’s $114 billion (USD), with the average cost per victim down approximately 20 percent. The reason the overall cost remains so high is that the pool of victimized online adults grew more rapidly - in other words, less money, but from more victims.
Lisa Nielsen, the author of "Teaching Generation Text: Using Cell Phones to Enhance Learning" and "The Innovative Educator" blog, believes it is time to shatter a few myths about students bringing their own devices (BYOD) to school.
Organizations that do not invest in security education for their employees put themselves at risk.
Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!
Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/
- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/
- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security
- http://www.scoop.it/t/ict-security-tools
- http://www.scoop.it/t/securite-pc-et-internet
Check out also "Security Education Services" from Trustwave:
Read more:
In 2009, Katy began a three-year plan to change instruction in the school district by promoting a standardized toolbox of web-based tools dubbed “Web 2.0.” They also set out guidelines for behavior in the digital space called “Digital Citizenship,” in the hopes that the school would not just teach kids math and reading, but also how to behave in a public digital world.
Gust MEES: while using "Bring Your Own Device" (Hashtag on Twitter = #BYOD) you must also take care about IT-Security and Privacy! Check my FREE course who explains in detail:
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
Read more: http://knolinfos.visibli.com/share/ZcOoM3
DFI News Digital Forensic Investigator is a multi-media resource for digital forensic professionals working in academic, government, law enforcement, and corporate settings.
Call it Invasion of the iPhone Snatchers: a new FinFisher-based spyware is built to infect iPhones and iPads (and Android, BlackBerry and Windows Phone gadgets too) in order to take over the device completely — all unbeknownst to the user.
The smartphones and tablets will innocently appear to be themselves, but in reality the mobile malware is working in the background to track the device’s location, monitor activity and intercept communications including emails, voice calls and text messages.
Gust MEES: in Education we use Internet for e-Learning + m-Learning and also we embrace "Bring Your Own Device" (Twitter Hashtag = #BYOD), so we need to know also about the dangers, risks and threats with it! That's our responsibility against our learners (students) and we need to learn the basics of IT-Security and share our knowledge and help our learners when security problems occur ;)
Read also my FREE courses about basic IT-Security (easy to learn, ONLY change your habits...):
- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/
- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security
- http://www.scoop.it/t/ict-security-tools
- http://www.scoop.it/t/securite-pc-et-internet
Read more:
Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network.
Even the government acknowledges that it can't prevent the use of personal devices for work-related functions, reports Marcos Colón.
With more than 60,000 employees, Cisco Systems has embraced the bring-your-own-device (BYOD) phenomenon, defined as the burgeoning penetration of personal smartphones, tablets and laptops into the workplace.
Gust MEES: While using BYOD and Social Media, teachers need to have knowledge of basic IT-Security (they must learn it...)! It's NOT ONLY the IT-Admin's and Technical Coordinator's role! This basic knowledge they should share with their learners to make the community stronger for a more secure Internet...
============================================= Wer A sagt, muss auch B sagen. (Plattdeutsche Variante: De A seggt, mut ok B seggen")
=============================================
I suggest to you to visit my FREE Online courses about basic IT-Security here:
Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure:
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
My "Thinglink" interactive courses embedded with "Rich-Media" in ONLY ONE IMAGE:
- https://www.thinglink.com/scene/296377469991124993#tlsite
In this age of "instant information" is it shortsighted to block social networking sites within an organisation purely because of stories in the press relating to scams, misuse and threats?
Is it time for a re-think? With the increase in the number of organisations embracing Bring Your Own Device (BYOD) this trend is only going to grow. So perhaps now is the time to look at educating users about the issues, and empowering them to use these tools responsibly, rather than trying to block access; after all, this may turn into a battle you can’t win.
So, how do you educate users about social networking sites and the issues around them?
- Passwords
- Sensible sharing
- Monitoring (for employees)
- Monitoring (for employers)
Read more:
Coalfire recently conducted a survey on the BYOD to work trend. The findings reveal many companies are not discussing mobile device cybersecurity issues with their employees and lack policies to protect sensitive company data.
The survey was conducted last month among 400 individuals in a variety of industries across North America that do not work in IT departments.
“The BYOD trend is not slowing down, and while it has many benefits, it’s also introducing a number of new security risks that may be foreign to many companies,” said Rick Dakin, CEO and chief security strategist with Coalfire.
===> “The results of this survey demonstrate that companies must do much more to protect their critical infrastructure as employees work from their own mobile devices, such as tablets and smartphones, in the workplace. Companies need to have security and education policies in place that protect company data on personal devices.” <===
Read more, a MUST: http://www.net-security.org/secworld.php?id=13424
|
The BYOD trend will make cyber security more complex Of the tips put forward by IDC, the first one is perhaps the most obvious and perhaps the reasons why the BYOD trend has caused so many headaches.
“The consensus is that BYOD is now a given. Whether you want it or not, employees will do your work on their own devices,” says Infosec commentator Stilgherrian.
“So your choice is whether to have a policy that acknowledges that and lays out the ground rules, or try to ban it and end up with an infestation of unknown and uncontrolled devices.”
However, as many enterprises are currently finding out, controlling and securing data on multiple devices is a lot easier said than done.
Read more, a MUST: http://technologyspectator.com.au/byod-security-commandments
A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs
Product of the Digital Services Advisory Group and Federal Chief Information Officers Council
Read more: http://www.whitehouse.gov/digitalgov/bring-your-own-device
Wirtschaftsspionage war noch nie so einfach. Erfahren Sie, wie eine einfache App Ihr Smartphone in ein Spionage Werkzeug verwandeln kann, welches nicht nur in der Lage ist Ihre Gespräche oder Text Nachrichten aufzunehmen, sondern sogar als „Wanze" jegliche Ihrer Aktivitäten überwachen kann.
Gust MEES: Check out also
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/
Video in English only:
- http://www.youtube.com/watch?v=D5DIOZzwsEc&feature=related
OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most concerning topics in the industry.
Gust MEES
Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/
- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/
- http://www.scoop.it/t/ict-security-tools
- http://www.scoop.it/t/securite-pc-et-internet
- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free
===> Be aware of the malware!!! <===
Read more: http://www.scmagazine.com/mobile-security-stats/slideshow/805/#0
“BYOD” Bring Your own Device. A great idea that can easily turn messy.
Biztech has introduced the BYOD: The Good, the Bad and the Ugly infographic asking you to answer 6 easy but important questions before you launch into a BYOD situation.
If your company is considering allowing employees to bring their own devices to work, make sure you have a game plan in place. BYOD has freed up many enterprises from the responsibility of exclusively purchasing and maintaining computing devices, such as notebooks, tablets and smartphones, but companies still need to have policies set in place to make things work. BizTech magazine has put together an infographic that highlights six core questions every company should consider before moving forward with BYOD:
- Who buys the devices?
Gust MEES: please read also my FREE course here
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
Read more: http://www.coolinfographics.com/blog/2012/9/10/byod-the-good-the-bad-and-the-ugly.html
Here are the most important aspects of BYOD to consider before implementation.
Gust MEES: check out also my FREE course about it here
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
Read more. a MUST: http://www.fedtechmagazine.com/article/2012/08/5-takeaways-cio-councils-byod-toolkit
As BYOD Trend Grows So Do Malware Attacks
The BYOD concept has been a growing trend for some years now as employees become more accustomed to using their own mobile computing devices in their jobs, and accessing corporate assets. The rapid adoption of high end smartphones and tablets including iPhones, iPads and Android devices along with the number of easily accessible apps is driving this concept forward. Cloud based services, accessible from almost anywhere, are also a key factor. The ‘Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017’ report report from Juniper found that while this trend can bring productivity benefits to businesses, it also poses potential security risks.
In particular, the report found that the majority of employee’s phones and smart devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions.
The war on cybercrime therefore continues for many organizations and especially their IT departments and CISOs. The total number of Computer viruses, trojans and web attacks is growing at their fastest pace in four years.
Read more, a MUST:
Organizations that do not invest in security education for their employees put themselves at risk. Trustwave's infographic outlines how.
Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!
Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:
National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/
- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/
- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security
- http://www.scoop.it/t/ict-security-tools
- http://www.scoop.it/t/securite-pc-et-internet
Check out also "Security Education Services" from Trustwave: - https://www.trustwave.com/security-education-services/
Read more:
Bring-Your-Own-Device (BYOD) bedeutet, dass der Zugriff auf die Unternehmensdaten und -Programme mittels der eigenen mobilen Endgeräten, also Smartphones und Tablets, erfolgt. Glaubt man Marktforschern, ist BYOD äußerst trendy – aber offensichtlich nur bei einer sehr kleinen Mitarbeitergruppe.
Mehr erfahren: http://blog.chip.de/business-blog/2012/09/05/byod-nur-ein-wunsch-der-it-freaks/
Article from FORBES 5/23/2012 @ 10:50AM |36,211 views
With 6 billion global mobile subscribers and over 35 billion apps downloaded to those devices, one begins to wonder how secure this situation is for businesses. In fact it’s not.
The situation can best be described as turning an organization’s network security into Swiss cheese, where holes are opening up from devices everywhere. Welcome to the mobile business revolution. Along with any major insurgency, what previously seemed secure meets what suddenly makes it vulnerable. =============================================
Gust MEES: Thanks to Kevin Corbett for this Tip and once again I should say; NOBODY IS PERFECT and a secure Internet can ONLY be there when ALL of us are helping to make it secure by protecting our "BYOD" devices!
Check out also my FREE courses about basic IT-Security here (easy to follow and to understand) by 5 minutes tutorials:
- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/
Read more:
Elementary school Principal Peter DeWitt writes about students' social and emotional health, and how educators can help young people find common ground. He can be found at www.petermdewitt.com.
Gust MEES: A MUST read... Check out also my FREE course about "BYOD" here:
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/
and my FREE courses about IT-Security here:
- http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Learning+IT-Security
Nowadays all employees bring their own Internet-aware devices to work. Employers and institutions such as schools think
These devices are often 'powered' by applications downloaded from some kind of App-Store/Market. The applications there should be safe, but are they? What kind of risks do they pose for personal or corporate data? Furthermore, the paper will describe different vectors of attack towards corporate networks and the risk of intractable data leakage problems: for example, encryption of company data on portable devices is by no means common practice.
Finally, we offer advice on how to handle BYOD policies in your own environment and if it is really worth it. Maybe 'Windows To Go' - a feature of Windows 8 that boots a PC from a Live USB stick which contains Win8, applications plus Group Policies applied by the admin - is a suitable base model for converting BYOD into a Managed By IT Device.
===> Remember: BYOD isn't coming, it is here already and it is (B)ig, (Y)et (O)utside (D)efence perimeters! <===
|
Your new post is loading...
This article made me think about what are my school policies and guideline for safe use of a mobile device at school.