21st Century Learning and Teaching
635.5K views | +121 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Cybersecurity'. Clear
Rescooped by Gust MEES from Social Media and its influence
May 24, 2012 11:15 AM
Scoop.it!

7 Steps to Safer Social Media in the Classroom

7 Steps to Safer Social Media in the Classroom | 21st Century Learning and Teaching | Scoop.it
How to create guidelines for responsible use of social tools.

...

1. Examine your school culture. Gain an understanding of how your community feels about social media.

 

2. Organize a team. Include both educators who use social media in the classroom and those who do not.

 

3. Research. Evaluate policies already in place at your school. Look around at other schools. See what they’ve done. Get a sense for what works and what doesn’t.

 

4. Write a draft and solicit feedback. This is the hard part, says Anderson. Gather the information you’ve collected and ask others to weigh in. Schedule meetings and talk to stakeholders face to face.

 

5. Have the draft vetted by the school attorney and school board. Make sure your policy does not violate any current laws, policies or ordinances.

 

6. Introduce the policy to the community. Every team member should be tasked with reaching out to different stakeholder groups, says Anderson. It’s important to be open and transparent.

 

7. Conduct periodic reviews. Your new social media policy should be “a living document that is revisited often.”

 

Gust MEES:

 

8. teachers and Educators need to learn the basics of #itsecurity also to understand why those 7 points were created, check out also:

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 


Via Ana Cristina Pratas, Gust MEES
No comment yet.
Scooped by Gust MEES
May 22, 2012 6:35 AM
Scoop.it!

Developing a Bring Your Own Device Policy

Developing a Bring Your Own Device Policy | 21st Century Learning and Teaching | Scoop.it
So you may have heard of this term: Bring Your Own Device (BYOD). If you haven’t come across it, it simply refers to individuals taking their own smartphones, laptops and tablets to work to connect and ‘sync’ them with the company network.

 

 

 

Read more: http://blogs.avg.com/business/developing-bring-device-policy/?utm_source=AVG+Blogs&utm_medium=twitter

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
May 21, 2012 4:31 PM
Scoop.it!

Social Networking Security in the Workplace

Social Networking Security in the Workplace | 21st Century Learning and Teaching | Scoop.it
At any given moment today, on-the-clock employees are updating their social media status, reading feeds and networking on business media sites.

 

Remember that hackers now target mobile devices such as smartphones and tablet PCs. Businesses should specify whether employees are permitted to access social networking sites from these devices and which apps may be used to do so.

 

Once policies are established, it may be necessary to reinforce them with a carefully considered combination of network monitoring and data protection technologies. In some cases, these technologies may already be in place as part of standard IT security measures.

 

===> If so, they should be configured to include social networking controls. <===

 

Read more:

http://www.computerworld.com/s/article/9227325/Social_Networking_Security_in_the_Workplace?source=rss_security&amp;amp;utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed:+computerworld/s/feed/topic/17+(Computerworld+Security+News)

 

No comment yet.
Scooped by Gust MEES
May 13, 2012 9:47 AM
Scoop.it!

SANS Information, Network, Computer Security Training...

SANS Information, Network, Computer Security Training... | 21st Century Learning and Teaching | Scoop.it
Computer security training, certification and free resources. We specialize in computer/network security, digital forensics, application security and IT audit.

 

Read more...

 

No comment yet.
Scooped by Gust MEES
May 10, 2012 9:28 AM
Scoop.it!

City University London in spotlight at Infosecurity Europe 2012

City University London in spotlight at Infosecurity Europe 2012 | 21st Century Learning and Teaching | Scoop.it
City University London showcases its course offerings at a major information security exhibition.

 

According to Kevin Jones, Professor of Dependability and Security: "This is our third year at Infosecurity Europe. We have been attending this important security industry exhibition, precisely because it is one of the key events for information security professionals and a good place to increase awareness of our course offering."

 

One of the important highlights of City's participation at the exhibition was Professor Jones' interview with Deputy Editor of Infosecurity magazine, Drew Amorosi, on the role of City University London in addressing the skills gap in the cyber security arena.

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
May 4, 2012 10:32 AM
Scoop.it!

Google liest Dropbox aus: Sicherheitslücke macht private Cloud-Inhalte öffentlich

Google liest Dropbox aus: Sicherheitslücke macht private Cloud-Inhalte öffentlich | 21st Century Learning and Teaching | Scoop.it
Gefährlicher Mut zur Lücke: Mit einem einfachen Trick lassen sich private Ordner auf dem Cloud-Speicher Dropbox über die Google-Suche einsehen.

 

===> In 21st Century "Privacy" and #Itsecurity" are also part of Education! <===

 

No comment yet.
Scooped by Gust MEES
May 3, 2012 5:53 PM
Scoop.it!

Get smart with 5 minutes tutorials/IT-Security/Part 3: Update your Third Party Applications!

Get smart with 5 minutes tutorials/IT-Security/Part 3: Update your Third Party Applications! | 21st Century Learning and Teaching | Scoop.it

Hi, I start a new series of blogs with educational vocation who will be easy to follow as they take only +/- 5 minutes and by following them and by applying my advice you will become a champion in IT-Security ;)

 

===> When teaching and learning in 21st Century, #itsecurity #cybersecurity is a must! <===

 

Read more:

 

- http://gustmeesfr.wordpress.com  (FR)

 

- http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

 

- http://gustmeesen.wordpress.com/

 

 

 

No comment yet.
Scooped by Gust MEES
May 2, 2012 5:58 PM
Scoop.it!

Get smart with 5 minutes tutorials/IT-Security/Part 1: browsers

Get smart with 5 minutes tutorials/IT-Security/Part 1: browsers | 21st Century Learning and Teaching | Scoop.it

Gust MEES

 

Hi, I start a new series of blogs with educational vocation who will be easy to follow as they take only +/- 5 minutes and by following them and by applying my advice you will become a champion in IT-Security...

 

===> When teaching and learning in 21st Century, #itsecurity #cybersecurity is a must! <===

 

Read more:

 

- http://gustmeesfr.wordpress.com  (FR)

 

- http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

 

- http://gustmeesen.wordpress.com/

 

 

No comment yet.
Scooped by Gust MEES
May 1, 2012 2:51 PM
Scoop.it!

Cross-platform malware exploits Java to attack PCs and Macs | ZDNet

Cross-platform malware exploits Java to attack PCs and Macs | ZDNet | 21st Century Learning and Teaching | Scoop.it

The same Java vulnerability used in the infamous Flashback malware is now being used as an attack vector for a single piece of malware that can infect both Windows and Mac OS X computers.

 

Security vendors have discovered a new piece of malware that attacks both PCs and Macs. It uses the same Java security vulnerability exploited by the Flashback malware that infected hundreds of thousands of Macs. While the attack vector is the same as in Flashback, this Java Applet checks which OS it is running on and downloads suitable malware for it.

 

Gust MEES: use my free courses to know how to stay secure, follow links below...

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

 

 

No comment yet.
Scooped by Gust MEES
April 25, 2012 6:38 AM
Scoop.it!

Macs, iPhones, iPads Are Now Bigger Targets for Malware, Attackers

Macs, iPhones, iPads Are Now Bigger Targets for Malware, Attackers | 21st Century Learning and Teaching | Scoop.it
The recent Flashback malware attack, which at its height infected more than 600,000 Macs- or more than 1 percent of all systems in use worldwide- not only was the largest such incident involving Apple systems, but also the latest in a string of...
No comment yet.
Scooped by Gust MEES
April 24, 2012 9:59 AM
Scoop.it!

1 in 5 Macs has malware on it!

1 in 5 Macs has malware on it! | 21st Century Learning and Teaching | Scoop.it
One in every five Mac computers is harbouring some kind of malware, a new study from the experts at Sophos has revealed.

Sophos has revealed a disturbingly high level of malware on Mac computers...

 

Read more...

 

No comment yet.
Scooped by Gust MEES
April 18, 2012 8:43 AM
Scoop.it!

PC-WELT-Serie: So arbeiten Hacker

PC-WELT-Serie: So arbeiten Hacker | 21st Century Learning and Teaching | Scoop.it
Fast täglich gibt es Meldungen über Sicherheitslücken in Betriebssystemen und Software. Und häufig gelingt es Hackern, diese Lücken auch auszunutzen.

 

 

Hier erfahren Sie, wie es zu den Sicherheitslücken kommt, wie Hacker die Lücken nutzen und wie Sie Ihre Systeme schützen.

 

 

No comment yet.
Rescooped by Gust MEES from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
April 9, 2012 2:54 PM
Scoop.it!

10 Simple Tips for Boosting The Security Of Your Mac

10 Simple Tips for Boosting The Security Of Your Mac | 21st Century Learning and Teaching | Scoop.it
At the moment, there are more than 100 million Mac OS X users around the world. The number has grown switfly during the past years we expect this growth to continue.
No comment yet.
Scooped by Gust MEES
May 22, 2012 7:34 AM
Scoop.it!

A new solution for authenticating BYOD

A new solution for authenticating BYOD | 21st Century Learning and Teaching | Scoop.it
New start-up SaaSID today launches a product at CloudForce London that seeks to solve a pressing and growing problem: the authentication of personal devices to the cloud.

 

 

 

Read more:

http://www.infosecurity-magazine.com/view/25911/a-new-solution-for-authenticating-byod/?utm_source=twitterfeed&amp;amp;utm_medium=twitter

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
May 21, 2012 4:43 PM
Scoop.it!

Stop Think Connect-USE SECURITY SETTINGS TO CONTROL ONLINE IDENTITY.

Stop Think Connect-USE SECURITY SETTINGS TO CONTROL ONLINE IDENTITY. | 21st Century Learning and Teaching | Scoop.it

When you cross the street, you look both ways to make sure it’s safe. Staying safe on the Internet is similar. It takes some common sense steps.

 

- STOP: Before you use the Internet, take time to understand the risks and learn how to spot potential problems.

 

- THINK: Take a moment to be certain the path ahead is clear. Watch for warning signs and consider how your actions online could impact your safety, or your family’s.

 

- CONNECT: Enjoy the Internet with greater confidence, knowing you’ve taken the right steps to safeguard yourself and your computer.

Protect yourself and help keep the web a safer place for everyone.

 

The Anti-Phishing Working Group (APWG) and National Cyber Security Alliance (NCSA) led the development of the STOP. THINK. CONNECT. campaign. The U.S. Department of Homeland Security provides the Federal Government's leadership for the STOP. THINK. CONNECT. campaign.

 

Read more and watch the videos:

http://www.stopthinkconnect.org/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
May 17, 2012 6:51 AM
Scoop.it!

IT managers see BYOD benefits but worry about risk - survey

IT managers see BYOD benefits but worry about risk - survey | 21st Century Learning and Teaching | Scoop.it
More than 80pc of IT managers think enterprises with a bring-your-own-device (BYOD) policy have a competitive advantage over other organisations, research commissioned by BT suggests.

 

Security concerns come with BYOD
The survey shows there is a caveat to BYOD, however, and that pertains to security.

 

Thirty-nine per cent of enterprises have experienced a security breach due to employees bringing in unauthorised devices – most commonly in the fast-moving consumer goods (FMCG) and pharmaceuticals sectors, according to the survey.

 

Read more...

 

No comment yet.
Scooped by Gust MEES
May 11, 2012 11:23 AM
Scoop.it!

Q&A: What BYOD means for IT

Q&A: What BYOD means for IT | 21st Century Learning and Teaching | Scoop.it
ZDNet editor in chief Larry Dignan and TechRepublic editor in chief Jason Hiner answer user questions about the BYOD phenomenon in IT.

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
May 6, 2012 12:56 PM
Scoop.it!

Get smart with 5 minutes tutorials/IT-Security/Part 5: Not Only Internet-Safety/ALSO IT-Security!

Get smart with 5 minutes tutorials/IT-Security/Part 5: Not Only Internet-Safety/ALSO IT-Security! | 21st Century Learning and Teaching | Scoop.it

Hi, I start a new series of blogs with educational vocation who will be easy to follow as they take only +/- 5 minutes and by following them and by applying my advice you will become a champion in IT-Security ;)

 

Part5: Not Only Internet-Safety/ALSO IT-Security!

 

Read more:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

- http://gustmeesen.wordpress.com

 

 

No comment yet.
Scooped by Gust MEES
May 3, 2012 6:08 PM
Scoop.it!

Cyber Security Training and Education Information Added to U.S. News University Directory

Cyber Security Training and Education Information Added to U.S. News University Directory | 21st Century Learning and Teaching | Scoop.it
TAMPA, Fla., May 3, 2012 /PRNewswire/ -- Finding a college or university that offers the right cyber security degree program traditionally takes hours of research.
No comment yet.
Rescooped by Gust MEES from Free Tutorials in EN, FR, DE
May 3, 2012 2:28 PM
Scoop.it!

Get smart with 5 minutes tutorials/IT-Security/Part 2: check your computer

Get smart with 5 minutes tutorials/IT-Security/Part 2: check your computer | 21st Century Learning and Teaching | Scoop.it

Hi, I start a new series of blogs with educational vocation who will be easy to follow as they take only +/- 5 minutes and by following them and by applying my advice you will become a champion in IT-Security...

 

===> When teaching and learning in 21st Century, #itsecurity #cybersecurity is a must! <===

 

Read more:

 

- http://gustmeesfr.wordpress.com (FR)

 

- http://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/

 

- http://gustmeesen.wordpress.com/

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
May 2, 2012 12:53 PM
Scoop.it!

Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster

Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster | 21st Century Learning and Teaching | Scoop.it

Oxford Muses on Mac Flashback: Worst Outbreak Since Blaster

 

So how bad was last month's Mac Flashback outbreak and who suffered the most? Our guess: it was bad, and university IT help desks.

 

And it looks like our guess might not be far off the mark.

 

===> Oxford University Computing Services' network security team (aka OxCERT) has written that they dealt "with what is probably the biggest outbreak since Blaster struck the Windows world all the way back in the summer of 2003." <===

 

OxCERT dealt with around 1000 incidents for Blaster. They've seen several hundred Flashback incidents… "and they keep on coming."

 

Read more...

 


Via Gust MEES
No comment yet.
Scooped by Gust MEES
April 26, 2012 8:45 AM
Scoop.it!

Sécurité : "Apple doit s'inspirer de Microsoft"

Sécurité : "Apple doit s'inspirer de Microsoft" | 21st Century Learning and Teaching | Scoop.it
Apple a des leçons à prendre chez Microsoft en matière de sécurité, c'est le contast dressé par Eugene Kaspersky, le PDG de l'éditeur de logiciels spécialisés qui porte son nom.

 

===> Utilisateurs Mac, apprenez la sécurité informatique dès à présent ! <===

 

Lire plus...

 

No comment yet.
Scooped by Gust MEES
April 24, 2012 10:05 AM
Scoop.it!

Willets Cyber security not solely military issue

Willets Cyber security not solely military issue | 21st Century Learning and Teaching | Scoop.it
The minister for cyber security claims the UK differs from the world on its approach to cyber crime.

 

===> Cyber security is not just an issue for the military to face, but one for both the public and private sector to work on together. <===

 

Read more...

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
April 19, 2012 7:29 AM
Scoop.it!

Ten Ways to Handle Insider Threats

Ten Ways to Handle Insider Threats | 21st Century Learning and Teaching | Scoop.it

Tough economic times make it tempting for an employee to switch his white hat to a black one for financial gain. Insider threats also include contractors, auditors, and anyone who has authorized access to systems.

 

Read more, A MUST...

 


Via IS Decisions, Gust MEES
No comment yet.
Scooped by Gust MEES
April 11, 2012 10:42 AM
Scoop.it!

Tips for combating online risks

Tips for combating online risks | 21st Century Learning and Teaching | Scoop.it

To help consumers understand online risks and practice safe behaviors, Webroot security experts recommend the following:

 

- Phone home safely - Mobile malware is on the rise, especially on Android devices, so take a moment to swing by the marketplace or app store to install a mobile security application that will safeguard your device against attacks. Many security apps can also help you locate your phone if it is lost or stolen.

 

- Be wary of WiFi - It can be tempting to take advantage of free WiFi access points in airports, hotels or cafes, but resist the urge to use those connections to do anything other than browse.

Unsecured wireless connections can leave you vulnerable to a variety of risks, from data-stealing malware to wireless snooping of your logins or email messages by other travelers and guests.

 

Much more: read article...

 

asma jmari 's comment, April 18, 2012 5:43 AM
More than welcome @Gust Mees