21st Century Learning and Teaching
596.0K views | +3 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'BYOD-Security'. Clear
Scooped by Gust MEES
October 17, 2012 3:17 PM
Scoop.it!

BYOD (Bring Your Own Device) School Policy

BYOD (Bring Your Own Device) School Policy | 21st Century Learning and Teaching | Scoop.it
Does your child bring a handheld device to school to access the Internet?

 

Read more:

http://info.uknowkids.com/blog/bid/234136/BYOD-Bring-Your-Own-Device-School-Policy

 

Erica Cruz's curator insight, October 20, 2015 2:45 PM

This article made me think about what are my school policies and guideline for safe use of a mobile device at school.  

Scooped by Gust MEES
October 13, 2012 10:23 AM
Scoop.it!

BYOD introduces gaping security holes for businesses

BYOD introduces gaping security holes for businesses | 21st Century Learning and Teaching | Scoop.it
Bring your own device (BYOD) is gaining more and more ground within enterprises, as employees are increasingly using their personal smartphones and tablets to check email, edit documents and do other work.

 

Read more, a MUST:

http://www.infosecurity-magazine.com/view/28750/byod-introduces-gaping-security-holes-for-businesses/?utm_source=twitterfeed&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
October 3, 2012 9:09 AM
Scoop.it!

What is your phone saying behind your back?

What is your phone saying behind your back? | 21st Century Learning and Teaching | Scoop.it

Do you always turn WiFi off on your smartphone before leaving the house or work? You might think there's no harm in having WiFi turned on but not connected to a network, but that's not necessarily the case.

 

A wireless device goes through a discovery process in which it attempts to connect to an available wireless network. This may either be ‘passive’ - listening for networks which are broadcasting themselves - or ‘active’ - sending out probe request packets in search of a network to connect to.

 

Most devices use both passive and active discovery in an attempt to connect to known/preferred networks. So it's very likely that your smartphone is broadcasting the names (SSIDs) of your favourite networks for anyone to see.

 

===> An ‘evil twin’ attack could even accomplish this without needing any knowledge of your WiFi password - very damaging for all of those who use mobile banking for instance! <===

 

Gust MEES: a MUST READ for anyone using m-Learning + "BYOD" and also any smartphone user...

 

http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 

No comment yet.
Scooped by Gust MEES
September 20, 2012 10:23 AM
Scoop.it!

BYOD : 34% des entreprises françaises l’interdisent

BYOD : 34% des entreprises françaises l’interdisent | 21st Century Learning and Teaching | Scoop.it
Si 34% d’entreprises interdisent l’usage de terminaux personnels, elle sont également 55% à appliquer des règles strictes pour encadrer l’accès aux documents professionnels depuis ces appareils.
No comment yet.
Scooped by Gust MEES
September 12, 2012 6:50 AM
Scoop.it!

BYOD-2012 Mobile Device Security Policy Survey

BYOD-2012 Mobile Device Security Policy Survey | 21st Century Learning and Teaching | Scoop.it
nCircle is the leading provider of automated security and compliance auditing solutions.

 

Gust MEES: while using e-Learning, m-Learning and "Bring Your Own Device" (Hashtag on Twitter = #BYOD) we need to know the dangers, risks and ALSO that NO DEVICE is perfect! ANY device containing a computer, even a mini-computer is vulnerable! Mini-computer? YES, also a smartphone with what ever OS is vulnerable as it is more a computer than a phone!

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

                   ===> Be aware of the malware!!! <===

 

Read more, a MUST:

http://www.ncircle.com/index.php?s=resources_surveys_Mobile-Security-Policy-2012

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
September 8, 2012 2:01 PM
Scoop.it!

4 Rogue IT Trends to Watch Out For BYOD

4 Rogue IT Trends to Watch Out For BYOD | 21st Century Learning and Teaching | Scoop.it
Is IT becoming a consumer product?...

 

Most people are participating in rogue IT without even realizing it. By definition, rogue IT is the unmanaged hardware and software that employees bring into their offices, connect to employers’ networks and use for professional productivity on personal time. At first, it doesn’t sound so bad. By allowing employees to connect to the Wi-Fi with their own devices, companies avoid the cost of providing the hardware. But as we learned from the BYOD toolkit from CIO.gov, BYOD programs aren’t profitable if they are uncontrolled, because problems, like the ones we’ll discuss below, arise.

 

===> Rogue IT is innovative and efficient for workers, but it’s becoming a real problem for IT managers. Here are four trends that are shaking up IT: <===

 

Gust MEES: check out also my FREE course about it here

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more:

http://www.statetechmagazine.com/article/2012/09/4-rogue-it-trends-watch-out

 

Gust MEES's comment, September 9, 2012 3:54 PM
Bonsoir,

Merci pour avoir fait lke #rescoop de ma curation, mais:

Quand on #rescoop un article d'un autre curateur on le fait à 100% et on ne fait pas de la censure sur le #scoopit de cet auteur !!!

Le texte complet est sur cette curation, voici ce qui manque:

"===> Rogue IT is innovative and efficient for workers, but it’s becoming a real problem for IT managers. Here are four trends that are shaking up IT: <===

Gust MEES: check out also my FREE course about it here
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/";

Et c'est l'article complet que je veux voir avec mes remarques personnelles, et rien d'autre !!!

Si vous n'êtes pas d'accord avec mes remarques personnelles je vous conseille vivement d'effacer ce #scoopit (il est marqué avec mon nom !!!) et de prendre l'adresse originaire de le republier avec votre propre nom sans mes commentaires !!!

J'espère que l'on s'est bien compris, autrement j'attends votre commentaire de retour !!!

Bonne soirée,
Gust
Stéphane Koch's comment, September 10, 2012 2:24 AM
Cher Gust, la "curation de contenu" est basée sur la mise à disposition de contenus que l'on aura auparavant "éditorialisés", l'idée étant d'organiser et de structurer l'information afin d'en offrir une "meilleure" lisibilité. Scoopit offre, par son champs d'édition, la possibilité d’aménager/organiser l'information à sa convenance... Que l'on partage, ou repartage une info... Concernant spécifiquement cet article ont je me permets - gentiment - de rappeler que vous n'en êtes pas l'auteur. Et d'ajouter qu'il n'y avait aucune volonté de censure de ma part... La mention de votre nom fait référence à la source de ce partage, et ne vous indique en aucune cas comme étant une référence par rapport au contenu de cet article, sur lequel par ailleurs vous n'avez aucun droit de propriété, si ce n'est celui d'être justement mentionné comme source dudit partage. Ni ne vous engage juridiquement. Vous devriez plutôt prendre en compte que la mention de votre nom permet aux lecteurs de venir visiter votre propre scoopit et de s'y abonner le cas échéant, et au final d'en apprendre plus sur vous et les différents services que vous offrez... Donc s'il y avait eu une volonté de "censure" de ma part, j'aurais "rescoopé" directement l'article sans mention de l'origine de son partage, d'autant plus que dans le cas présent je n'ai pas altéré ou modifié le contenu de l'article lors de sa "réédition".

Bref, si vous n'aviez pas utilisé un ton aussi peu courtois, j'aurais accédé avec plaisir à votre demande... Je vais donc laisser les choses en l'état, étant donné que - comme mentionné précédemment - cela permettra non seulement aux lecteurs intéressés d'accéder à votre scoopit, mais aussi de lire votre commentaire, et par conséquent, ce que vous vouliez communiquer.... Voilà pour ce qui est de mon "commentaire de retour".

Pour finir, je ne peux m'empêcher de "quoter" "2001: A Space Odyssey (1968)". Je pense que c'est tout à fait approprié à la situation ;) "Look Dave, I can see you're really upset about this. I honestly think you ought to sit down calmly, take a stress pill, and think things over."
Scooped by Gust MEES
September 7, 2012 6:44 PM
Scoop.it!

Cybercrime goes mobile [Infographic in pdf]

The Norton Cybercrime Report is out for 2012! Cybercrime continues to have far-reaching effects and is increasingly a problem on mobile devices and in our social networks (where we seem to be less vigilant).

 

After surveying more than 13,000 consumers in 24 countries, the researchers found that the numbers of online adults increased by 20 percent from last year, and that cybercrime impacted just under &frac12; of them in the previous 12 months. The total direct consumer cost was calculated to be $110 billion, slightly down from last year’s $114 billion (USD), with the average cost per victim down approximately 20 percent. The reason the overall cost remains so high is that the pool of victimized online adults grew more rapidly - in other words, less money, but from more victims.

 

No comment yet.
Scooped by Gust MEES
September 6, 2012 10:37 AM
Scoop.it!

7 Myths About BYOD Debunked

7 Myths About BYOD Debunked | 21st Century Learning and Teaching | Scoop.it
Lisa Nielsen, the author of "Teaching Generation Text: Using Cell Phones to Enhance Learning" and "The Innovative Educator" blog, believes it is time to shatter a few myths about students bringing their own devices (BYOD) to school.

 

Organizations that do not invest in security education for their employees put themselves at risk.

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOV http://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

Check out also "Security Education Services" from Trustwave:
- https://www.trustwave.com/security-education-services/

 

 

Read more:

http://thejournal.com/articles/2011/11/09/7-byod-myths.aspx?m=2&amp;amp;utm_source=buffer&amp;amp;buffer_share=4eae5

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
September 6, 2012 8:22 AM
Scoop.it!

How to Launch a Successful BYOD Program

How to Launch a Successful BYOD Program | 21st Century Learning and Teaching | Scoop.it


Katy Independent School District (ISD) has a student population of 63,000 students and 56 schools – elementary, middle and high schools. There are 83 languages spoken by students in the district and 31 percent of the student population is on free or reduced lunch programs.

 

In 2009, Katy began a three-year plan to change instruction in the school district by promoting a standardized toolbox of web-based tools dubbed “Web 2.0.” They also set out guidelines for behavior in the digital space called “Digital Citizenship,” in the hopes that the school would not just teach kids math and reading, but also how to behave in a public digital world.

 

Gust MEES: while using "Bring Your Own Device" (Hashtag on Twitter = #BYOD) you must also take care about IT-Security and Privacy! Check my FREE course who explains in detail:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Read more:

http://knolinfos.visibli.com/share/ZcOoM3

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
September 1, 2012 8:17 AM
Scoop.it!

Spyware Takes Over iPhones, Androids

Spyware Takes Over iPhones, Androids | 21st Century Learning and Teaching | Scoop.it
DFI News Digital Forensic Investigator is a multi-media resource for digital forensic professionals working in academic, government, law enforcement, and corporate settings.

 

Call it Invasion of the iPhone Snatchers: a new FinFisher-based spyware is built to infect iPhones and iPads (and Android, BlackBerry and Windows Phone gadgets too) in order to take over the device completely — all unbeknownst to the user.

 

The smartphones and tablets will innocently appear to be themselves, but in reality the mobile malware is working in the background to track the device’s location, monitor activity and intercept communications including emails, voice calls and text messages.

 

Gust MEES: in Education we use Internet for e-Learning + m-Learning and also we embrace "Bring Your Own Device" (Twitter Hashtag = #BYOD), so we need to know also about the dangers, risks and threats with it! That's our responsibility against our learners (students) and we need to learn the basics of IT-Security and share our knowledge and help our learners when security problems occur ;)

 

Read also my FREE courses about basic IT-Security (easy to learn, ONLY change your habits...):

 


- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

 

Read more:

http://www.dfinews.com/news/spyware-takes-over-iphones-androids?et_cid=2825646&amp;amp;et_rid=454853272&amp;amp;linkid=http%3A%2F%2Fwww.dfinews.com%2Fnews%2Fspyware-takes-over-iphones-androids#.UEDceehnFCE.twitter

 

Scooped by Gust MEES
August 28, 2012 12:25 PM
Scoop.it!

Embracing BYOD Mobile challenge

Embracing BYOD Mobile challenge | 21st Century Learning and Teaching | Scoop.it
Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network.

 

Even the government acknowledges that it can't prevent the use of personal devices for work-related functions, reports Marcos Colón.

 

With more than 60,000 employees, Cisco Systems has embraced the bring-your-own-device (BYOD) phenomenon, defined as the burgeoning penetration of personal smartphones, tablets and laptops into the workplace.

 

Gust MEES: While using BYOD and Social Media, teachers need to have knowledge of basic IT-Security (they must learn it...)! It's NOT ONLY the IT-Admin's and Technical Coordinator's role! This basic knowledge they should share with their learners to make the community stronger for a more secure Internet...

 

=============================================

Wer A sagt, muss auch B sagen. (Plattdeutsche Variante: De A seggt, mut ok B seggen")


Translation: If you say A, you have to say B as well.


===> Meaning: No half-assed evading or cherry picking. <===


Meaning: If you want or assert A and it turns out to involve B, you have to put up with B too.


Meaning: Follow through [don't wimp out]


Similar: "In for a penny, in for a pound."


Strauss, Emmanuel (1998). Dictionary of European Proverbs. Routledge. p. 957. ISBN 0415160502.

=============================================

 

I suggest to you to visit my FREE Online courses about basic IT-Security here:

 

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

My "Thinglink" interactive courses embedded with "Rich-Media" in ONLY ONE IMAGE:

 

- https://www.thinglink.com/scene/296377469991124993#tlsite

 

 

No comment yet.
Scooped by Gust MEES
August 20, 2012 2:30 PM
Scoop.it!

View from the IT desk: Securing social networking in the workplace

View from the IT desk: Securing social networking in the workplace | 21st Century Learning and Teaching | Scoop.it
In this age of "instant information" is it shortsighted to block social networking sites within an organisation purely because of stories in the press relating to scams, misuse and threats?

 

Is it time for a re-think?

With the increase in the number of organisations embracing Bring Your Own Device (BYOD) this trend is only going to grow.

So perhaps now is the time to look at educating users about the issues, and empowering them to use these tools responsibly, rather than trying to block access; after all, this may turn into a battle you can’t win.

 

So, how do you educate users about social networking sites and the issues around them?

 

- Passwords


Teach users about good password management including password strength (difficult to guess but easy to remember), password security (keep it to yourself) and using different passwords for different sites (a password is only as strong as the weakest system you use it on).


- Scams, clickjacking and fake apps


Teach users how to spot something that is attempting to drive traffic, harvest data or steal identities. If people are aware of what can happen they may be less inclined to click anything-and-everything in the hope of a free gift.

 

- Sensible sharing


Social networking sites can be restricted to allow only a limited number of people to access data and information. If you have a target audience, do you need to tell ‘everyone’ or only those you wish to educate? Teaching people how to amend these settings to protect themselves will help you protect any corporate data you wish to place on there.

 

- Monitoring (for employees)


Social networks send emails relating to access, posts and mentions. Monitoring these will highlight any potential misuse which can be stopped before it gets too severe.

 

- Monitoring (for employers)


Regular checks of internet usage will show any misuse of social networking sites. All employees should be aware you are monitoring internet access and that misuse will be investigated. This should act as a deterrent for anyone who wishes to misuse the privilege and use corporate resources to "check their CityVille..." or "click that link for a free iPad..."

 

Read more:

http://nakedsecurity.sophos.com/2012/08/20/securing-social-networking/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 

No comment yet.
Scooped by Gust MEES
August 14, 2012 10:07 AM
Scoop.it!

BYOD reality: Missing mobile device usage policies

BYOD reality: Missing mobile device usage policies | 21st Century Learning and Teaching | Scoop.it

Coalfire recently conducted a survey on the BYOD to work trend. The findings reveal many companies are not discussing mobile device cybersecurity issues with their employees and lack policies to protect sensitive company data.

 

The survey was conducted last month among 400 individuals in a variety of industries across North America that do not work in IT departments.

 

“The BYOD trend is not slowing down, and while it has many benefits, it’s also introducing a number of new security risks that may be foreign to many companies,” said Rick Dakin, CEO and chief security strategist with Coalfire.

 

===> “The results of this survey demonstrate that companies must do much more to protect their critical infrastructure as employees work from their own mobile devices, such as tablets and smartphones, in the workplace. Companies need to have security and education policies in place that protect company data on personal devices.” <===

 

Read more, a MUST:

http://www.net-security.org/secworld.php?id=13424

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
October 15, 2012 6:06 PM
Scoop.it!

The BYOD security commandments

The BYOD security commandments | 21st Century Learning and Teaching | Scoop.it

The BYOD trend will make cyber security more complex

Of the tips put forward by IDC, the first one is perhaps the most obvious and perhaps the reasons why the BYOD trend has caused so many headaches.

 

“The consensus is that BYOD is now a given. Whether you want it or not, employees will do your work on their own devices,” says Infosec commentator Stilgherrian.

 

“So your choice is whether to have a policy that acknowledges that and lays out the ground rules, or try to ban it and end up with an infestation of unknown and uncontrolled devices.”

 

However, as many enterprises are currently finding out, controlling and securing data on multiple devices is a lot easier said than done.

 

Read more, a MUST:

http://technologyspectator.com.au/byod-security-commandments

 

No comment yet.
Scooped by Gust MEES
October 4, 2012 9:57 AM
Scoop.it!

Bring Your Own Device | The White House

Bring Your Own Device | The White House | 21st Century Learning and Teaching | Scoop.it

A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs


August 23, 2012

Product of the Digital Services Advisory Group and Federal Chief Information Officers Council

 

Read more:

http://www.whitehouse.gov/digitalgov/bring-your-own-device

 

No comment yet.
Scooped by Gust MEES
September 23, 2012 11:01 AM
Scoop.it!

BYOD: Cybercrime goes mobile - Cyberkriminalität in der mobilen Welt

Wirtschaftsspionage war noch nie so einfach. Erfahren Sie, wie eine einfache App Ihr Smartphone in ein Spionage Werkzeug verwandeln kann, welches nicht nur in der Lage ist Ihre Gespräche oder Text Nachrichten aufzunehmen, sondern sogar als „Wanze" jegliche Ihrer Aktivitäten überwachen kann.

 

Gust MEES: Check out also

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

Video in English only:

 

http://www.youtube.com/watch?v=D5DIOZzwsEc&amp;feature=related

 

 

No comment yet.
Scooped by Gust MEES
September 12, 2012 1:37 PM
Scoop.it!

BYOD: Mobile security stats

BYOD: Mobile security stats | 21st Century Learning and Teaching | Scoop.it
OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most concerning topics in the industry.

 

Gust MEES

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

           ===> Be aware of the malware!!! <===

 

Read more:

http://www.scmagazine.com/mobile-security-stats/slideshow/805/#0

 

No comment yet.
Scooped by Gust MEES
September 11, 2012 10:14 AM
Scoop.it!

BYOD: The Good, the Bad and the Ugly

BYOD: The Good, the Bad and the Ugly | 21st Century Learning and Teaching | Scoop.it

“BYOD” Bring Your own Device. A great idea that can easily turn messy.

 

Biztech has introduced the BYOD: The Good, the Bad and the Ugly infographic asking you to answer 6 easy but important questions before you launch into a BYOD situation.

 

If your company is considering allowing employees to bring their own devices to work, make sure you have a game plan in place.

BYOD has freed up many enterprises from the responsibility of exclusively purchasing and maintaining computing devices, such as notebooks, tablets and smartphones, but companies still need to have policies set in place to make things work.

BizTech magazine has put together an infographic that highlights six core questions every company should consider before moving forward with BYOD:

 

- Who buys the devices?


- What’s the right policy?


- What’s the employee’s role?


- What’s the impact on IT?


- How do we tackle security?


- How about apps?


For each of these questions, we’ve outlined a good answer, which we’d advise you to follow; a bad answer, which probably isn’t the best way to handle things; and an ugly answer, which should be avoided at all costs. Hopefully, this will help your company remain on the pleasant side of this growing workplace trend.

 

Gust MEES: please read also my FREE course here

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more:

http://www.coolinfographics.com/blog/2012/9/10/byod-the-good-the-bad-and-the-ugly.html

 

No comment yet.
Scooped by Gust MEES
September 8, 2012 1:46 PM
Scoop.it!

Here are the most important aspects of BYOD to consider

Here are the most important aspects of BYOD to consider | 21st Century Learning and Teaching | Scoop.it
Here are the most important aspects of BYOD to consider before implementation.

 

 

 

 

 

 

 

 

 

 

 

Gust MEES: check out also my FREE course about it here 

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more. a MUST:

http://www.fedtechmagazine.com/article/2012/08/5-takeaways-cio-councils-byod-toolkit

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
September 7, 2012 7:19 AM
Scoop.it!

As BYOD Trend Grows So Do Malware Attacks

As BYOD Trend Grows So Do Malware Attacks | 21st Century Learning and Teaching | Scoop.it
As BYOD Trend Grows So Do Malware Attacks
The report found that the majority of employee’s devices did not have any form of security software loaded nor were company materials protected.

 

The BYOD concept has been a growing trend for some years now as employees become more accustomed to using their own mobile computing devices in their jobs, and accessing corporate assets.

The rapid adoption of high end smartphones and tablets including iPhones, iPads and Android devices along with the number of easily accessible apps is driving this concept forward. Cloud based services, accessible from almost anywhere, are also a key factor.

The ‘Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017’ report report from Juniper found that while this trend can bring productivity benefits to businesses, it also poses potential security risks.

 

In particular, the report found that the majority of employee’s phones and smart devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions.

 

The war on cybercrime therefore continues for many organizations and especially their IT departments and CISOs. The total number of Computer viruses, trojans and web attacks is growing at their fastest pace in four years.

 

Read more, a MUST:

http://www.infosecisland.com/blogview/22364-As-BYOD-Trend-Grows-So-Do-Malware-Attacks.html?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
September 6, 2012 9:46 AM
Scoop.it!

Infographic: Uneducated Employees and Their Seven Deadly Sins

Infographic: Uneducated Employees and Their Seven Deadly Sins | 21st Century Learning and Teaching | Scoop.it
Organizations that do not invest in security education for their employees put themselves at risk. Trustwave's infographic outlines how.

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOVhttp://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/securite-pc-et-internet

 

 Check out also "Security Education Services" from Trustwave:

- https://www.trustwave.com/security-education-services/

 

 

 

 

Read more:

https://www.trustwave.com/trustednews/2012/09/infographic-uneducated-employees-their-seven-deadly-sins

 

No comment yet.
Scooped by Gust MEES
September 6, 2012 5:17 AM
Scoop.it!

BYOD - nur ein Wunsch der IT-Freaks

BYOD - nur ein Wunsch der IT-Freaks | 21st Century Learning and Teaching | Scoop.it

Bring-Your-Own-Device (BYOD) bedeutet, dass der Zugriff auf die Unternehmensdaten und -Programme mittels der eigenen mobilen Endgeräten, also Smartphones und Tablets, erfolgt. Glaubt man Marktforschern, ist BYOD äußerst trendy – aber offensichtlich nur bei einer sehr kleinen Mitarbeitergruppe.

 

Mehr erfahren:

http://blog.chip.de/business-blog/2012/09/05/byod-nur-ein-wunsch-der-it-freaks/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
August 30, 2012 6:29 PM
Scoop.it!

What Apple and Google are not Telling you About Mobile Device Security (infographic) - Forbes

What Apple and Google are not Telling you About Mobile Device Security (infographic) - Forbes | 21st Century Learning and Teaching | Scoop.it

Article from FORBES 5/23/2012 @ 10:50AM |36,211 views

 

With 6 billion global mobile subscribers and over 35 billion apps downloaded to those devices, one begins to wonder how secure this situation is for businesses. In fact it’s not.

 

The situation can best be described as turning an organization’s network security into Swiss cheese, where holes are opening up from devices everywhere.

Welcome to the mobile business revolution. Along with any major insurgency, what previously seemed secure meets what suddenly makes it vulnerable.

=============================================

 

Gust MEES: Thanks to Kevin Corbett for this Tip and once again I should say; NOBODY IS PERFECT and a secure Internet can ONLY be there when ALL of us are helping to make it secure by protecting our "BYOD" devices!

 

Check out also my FREE courses about basic IT-Security here (easy to follow and to understand)  by 5 minutes tutorials:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Read more:

http://www.forbes.com/sites/markfidelman/2012/05/23/what-apple-and-google-are-not-telling-you-about-mobile-device-security-infographic/

 

 

No comment yet.
Rescooped by Gust MEES from 21st Century Tools for Teaching-People and Learners
August 27, 2012 4:59 AM
Scoop.it!

Are Schools Prepared to Let Students BYOD?

Are Schools Prepared to Let Students BYOD? | 21st Century Learning and Teaching | Scoop.it
Elementary school Principal Peter DeWitt writes about students' social and emotional health, and how educators can help young people find common ground. He can be found at www.petermdewitt.com.

 

 

 

 

Gust MEES: A MUST read... Check out also my FREE course about "BYOD" here:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

and my FREE courses about IT-Security here:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Learning+IT-Security

 

No comment yet.
Scooped by Gust MEES
August 14, 2012 10:19 AM
Scoop.it!

BYOD:(B)rought (Y)our (O)wn (D)estruction?

BYOD:(B)rought (Y)our (O)wn (D)estruction? | 21st Century Learning and Teaching | Scoop.it
Nowadays all employees bring their own Internet-aware devices to work. Employers and institutions such as schools think
they can save a lot of money by having their employees or students use their own kit.

 

These devices are often 'powered' by applications downloaded from some kind of App-Store/Market. The applications there should be safe, but are they? What kind of risks do they pose for personal or corporate data? Furthermore, the paper will describe different vectors of attack towards corporate networks and the risk of intractable data leakage problems: for example, encryption of company data on portable devices is by no means common practice.

 

Finally, we offer advice on how to handle BYOD policies in your own environment and if it is really worth it. Maybe 'Windows To Go' - a feature of Windows 8 that boots a PC from a Live USB stick which contains Win8, applications plus Group Policies applied by the admin - is a suitable base model for converting BYOD into a Managed By IT Device.

 

===> Remember: BYOD isn't coming, it is here already and it is (B)ig, (Y)et (O)utside (D)efence perimeters! <===

 

No comment yet.