21st Century Learning and Teaching
586.6K views | +275 today
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'BYOD-Dangers', 'eLearning'. Clear
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Mobile security stats

BYOD: Mobile security stats | 21st Century Learning and Teaching | Scoop.it
OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most concerning topics in the industry.

 

Gust MEES

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

           ===> Be aware of the malware!!! <===

 

Read more:

http://www.scmagazine.com/mobile-security-stats/slideshow/805/#0

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

7 Myths About BYOD Debunked

7 Myths About BYOD Debunked | 21st Century Learning and Teaching | Scoop.it
Lisa Nielsen, the author of "Teaching Generation Text: Using Cell Phones to Enhance Learning" and "The Innovative Educator" blog, believes it is time to shatter a few myths about students bringing their own devices (BYOD) to school.

 

Organizations that do not invest in security education for their employees put themselves at risk.

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOV http://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

Check out also "Security Education Services" from Trustwave:
- https://www.trustwave.com/security-education-services/

 

 

Read more:

http://thejournal.com/articles/2011/11/09/7-byod-myths.aspx?m=2&amp;amp;utm_source=buffer&amp;amp;buffer_share=4eae5

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What is your phone saying behind your back?

What is your phone saying behind your back? | 21st Century Learning and Teaching | Scoop.it

Do you always turn WiFi off on your smartphone before leaving the house or work? You might think there's no harm in having WiFi turned on but not connected to a network, but that's not necessarily the case.

 

A wireless device goes through a discovery process in which it attempts to connect to an available wireless network. This may either be ‘passive’ - listening for networks which are broadcasting themselves - or ‘active’ - sending out probe request packets in search of a network to connect to.

 

Most devices use both passive and active discovery in an attempt to connect to known/preferred networks. So it's very likely that your smartphone is broadcasting the names (SSIDs) of your favourite networks for anyone to see.

 

===> An ‘evil twin’ attack could even accomplish this without needing any knowledge of your WiFi password - very damaging for all of those who use mobile banking for instance! <===

 

Gust MEES: a MUST READ for anyone using m-Learning + "BYOD" and also any smartphone user...

 

http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Here are the most important aspects of BYOD to consider

Here are the most important aspects of BYOD to consider | 21st Century Learning and Teaching | Scoop.it
Here are the most important aspects of BYOD to consider before implementation.

 

 

 

 

 

 

 

 

 

 

 

Gust MEES: check out also my FREE course about it here 

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more. a MUST:

http://www.fedtechmagazine.com/article/2012/08/5-takeaways-cio-councils-byod-toolkit

 

No comment yet.