21st Century Learning and Teaching
586.6K views | +1 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'BYOD-Security'. Clear
Scooped by Gust MEES
Scoop.it!

Your Mobile Device Is a Hack Waiting to Happen: Pros

Your Mobile Device Is a Hack Waiting to Happen: Pros | 21st Century Learning and Teaching | Scoop.it
Many users don't take steps to protect themselves and their data on their smartphones and tablets.

 

When it comes to keeping their mobile devices safe and secure, consumers are playing a game of cat-and-mouse with cybercriminals.

 

Although most users are aware that mobile devices can be hacked, just as desktops or laptops can, many still don't take steps to protect themselves and the data on their smartphones and tablets, according to a study released Wednesday at the CTIA conference in Las Vegas.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free/?tag=Mobile-Security

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Threat Report: Q1-2013 [pdf]

Gust MEES's insight:

 

A MUST read!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- - http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Device+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How do cyber criminals get your data? What do they do with it?

How do cyber criminals get your data? What do they do with it? | 21st Century Learning and Teaching | Scoop.it

By now, most everyone has heard the story: on April 23rd, the AP’s twitter account was “hacked.” The tweet, which was a fairly obviously fake, still managed to send Wall Street into a panic. The Dow Jones Industrial Average dropped 145 points in 2 minutes.


So why is this important? It highlights the reality of the threat landscape.


The point of the story is that mobile security isn’t just about protecting you from viruses. Threats don’t only come in the form of malicious applications that one inadvertently “sideloads” onto his or her device. Mobile security is also about making sure your data is protected.

 

It doesn’t matter whether the economic climate is good or bad, there is always a market for fraud. The marketplace for carding is growing and will continue to grow. And as the engineers behind these types of attacks get smarter and smarter, we can only expect to see them more and more often.






Gust MEES's insight:

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

Gust MEES's curator insight, May 14, 2013 5:11 PM

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

asma jmari 's comment, May 15, 2013 7:44 AM
thank you Gust MEES I'll check it out
asma jmari 's comment, May 20, 2013 6:34 AM
believe it or not they do and hacking is more like a hobby some do it for fun and some just dedicate themselves to it and make it a job
Scooped by Gust MEES
Scoop.it!

Security Think Tank: BYOD security: policy, control, containment, and management

Security Think Tank: BYOD security: policy, control, containment, and management | 21st Century Learning and Teaching | Scoop.it
With the growth of BYOD, what security measures can IT take to ensure security of enterprise data – and does MDM have a role?
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Security: Prevent Mobile Application Code Security Risks | Veracode

Mobile Security: Prevent Mobile Application Code Security Risks | Veracode | 21st Century Learning and Teaching | Scoop.it
Free Mobile Security Guide that shows you how to find and prevent code security risks for mobile applications.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographi

 

http://www.scoop.it/t/ict-security-tools

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Infographic: The High Cost of BYOD | Trustwave

Infographic: The High Cost of BYOD | Trustwave | 21st Century Learning and Teaching | Scoop.it
Businesses today are embracing BYOD- 75% of businesses let employees use their own devices to access the network. What threats are lurking behind this mobile revolution?
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=BYOD

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Survey: Despite Security Incidents, BYOD Worth The Risks [Infographic]

Survey: Despite Security Incidents, BYOD Worth The Risks [Infographic] | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?q=BYOD

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD in Education

BYOD A practical guide that will get you thinking!

 

Gust MEES's insight:

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Ness Crouch's curator insight, April 16, 2013 5:34 PM

Great explanation of Bring Your Own Device thinking. This can guide discussion about BYOD in schools. 

Scooped by Gust MEES
Scoop.it!

Fast 33 Millionen Android-Geräte sind mit Malware infiziert

Fast 33 Millionen Android-Geräte sind mit Malware infiziert | 21st Century Learning and Teaching | Scoop.it
Laut einer Studie von NQ Mobile hat sich die Anzahl der Malware 2012 gegenüber 2011 verdreifacht. Im vergangenen Jahr gab es über 65.000 Schadprogramme.
Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

WiFi: VPN Client for Mac | Mac Protection

WiFi: VPN Client for Mac | Mac Protection | 21st Century Learning and Teaching | Scoop.it
Hotspot Shield VPN for Mac offers protection against malware threats and allows you to browse your favorite web sites anonymously.
Gust MEES's insight:

 

Nobody is perfect!!! NO OS is perfect and therefore it is a MUST 2 install a VPN when using public WiFi!

 

Check also:

 

https://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Wireless Network Design | IT Solutions Blog | BYOD

Wireless Network Design | IT Solutions Blog | BYOD | 21st Century Learning and Teaching | Scoop.it
IT Solutions blog covering Technology in the Classroom, Wireless Solutions and Hospital Wireless Network IT Solutions.
Gust MEES's insight:

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

U.K. data watchdog warns on BYOD risks

U.K. data watchdog warns on BYOD risks | 21st Century Learning and Teaching | Scoop.it
Bringing your own device to work may be beneficial to the worker, but what about when personal citizen data gets loaded on to such devices? British authorities are firing off the warning flares.

 

The ICO this week published its latest guidance note [PDF] on some of the risks that employers face when allowing personal devices into the enterprise. While BYOD is on the rise in the U.K., employers must still remember that the Data Protection Act—which stems from a 1995 European directive—still applies to these devices.

 

Gust MEES's insight:

 

The ICO this week published its latest guidance note [PDF] on some of the risks that employers face when allowing personal devices into the enterprise. While BYOD is on the rise in the U.K., employers must still remember that the Data Protection Act—which stems from a 1995 European directive—still applies to these devices.

 

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://www.ico.gov.uk/news/latest_news/2013/~/media/documents/library/Data_Protection/Practical_application/ico_bring_your_own_device_byod_guidance.ashx

 

Mike Hodges Eirias's curator insight, May 8, 2013 3:56 AM

So you don't have to be a big business to be affected by the DPA!

Scooped by Gust MEES
Scoop.it!

Adoption Rates of New Styles of K-12 Teaching [Infographic] - BYOD

Adoption Rates of New Styles of K-12 Teaching [Infographic] - BYOD | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Check it out...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

   Clueful   -   Privacy Monitoring App for iPhone & Android

   Clueful   -   Privacy Monitoring App for iPhone & Android | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Scooped by Gust MEES
Scoop.it!

Mobile crimeware and the global criminal marketplace-BYOD

Mobile crimeware and the global criminal marketplace-BYOD | 21st Century Learning and Teaching | Scoop.it
The sprawling mobile devices marketplace has spawned an industrialized mobile financial fraud plexus that today drives increasingly sophisti...
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Device+Security

 

Scooped by Gust MEES
Scoop.it!

Bring Your Own Device Toolkit

Bring Your Own Device Toolkit | 21st Century Learning and Teaching | Scoop.it

Today’s education system is evolving to take full advantage of the potential of mobile technology devices to inspire learning and create independent, critical thinkers.


However, with tight budgets, many schools are hoping to bring technology into the classroom without the costly burden of purchasing a device for each student. One potential solution that is being explored is BYOD, or Bring Your Own Device. This allows students to bring their personal laptops, tablets, and smartphones from home and use them for educational applications in the classroom.


At a time when budgets are shrinking, school districts are considering BYOD programs to integrate cost-effective technology into their educational programs. It’s a promising idea, especially for schools that lack sufficient technology budgets. BYOD takes advantage of the technology that students already own and are familiar with.


However, BYOD programs have been met with some criticism from staff and administrators who believe the challenges outweigh the perceived benefits. Continue reading...

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Infographic: The High Cost of BYOD

Infographic: The High Cost of BYOD | 21st Century Learning and Teaching | Scoop.it
Businesses today are embracing BYOD- 75% of businesses let employees use their own devices to access the network. What threats are lurking behind this mobile revolution?
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?q=BYOD

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

EdTech "vs." IT

EdTech "vs." IT | 21st Century Learning and Teaching | Scoop.it

Unfortunately, the "EdTech vs. IT" mindset is all too prevalent in many organizations.  Operational IT looks down disdainfully on their users from an ivory tower, viewing them as "threats" to be carefully controlled and monitored. 

 

Teachers view the IT department as a bunch of out of touch control freaks who hinder rather than facilitate their work. As a former teacher, I have seen it from both sides.

This sad situation is wrong on many levels. 

 

===> The relationship between IT and users should be a partnership, not a boxing match! <===

 

Gust MEES's insight:

 

===> The relationship between IT and users should be a partnership, not a boxing match! <===

 

Make IT-Admin's life easier (and the relationship with...) by Learning and Teaching the basics of Cyber-Security, check below!

 

Learn more:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=BYOD

 

Education and Security:

 

https://gustmees.wordpress.com/2013/04/22/i-got-interviewed-feeling-honored/

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

A Glimpse At The BYOD Device Of The Future [Infographic]

A Glimpse At The BYOD Device Of The Future [Infographic] | 21st Century Learning and Teaching | Scoop.it
BYOD has changed how the barriers of tech adoption are seen. First and foremost, they're now visible (the barriers). Many schools and districts are finding…
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile Security – Android vs. iOS [Infographic]

Mobile Security – Android vs. iOS [Infographic] | 21st Century Learning and Teaching | Scoop.it
No comment yet.
Scooped by Gust MEES
Scoop.it!

4 Big Concerns About BYOD In Schools

4 Big Concerns About BYOD In Schools | 21st Century Learning and Teaching | Scoop.it
There are a few snags that can get in the way of implementing BYOD in schools and are worth knowing about before setting out on a BYOD path.

 

   

 

 

 

1. Security

2. Safety

3. Affordability

4. Networking and Compatibility

 

Gust MEES's insight:

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Importance Of Mobile Learning In (And Out Of) The Classroom [Infographic]

The Importance Of Mobile Learning In (And Out Of) The Classroom [Infographic] | 21st Century Learning and Teaching | Scoop.it
There has always been at least some sort of disconnect between how things like mobile learning are taught in a classroom and how things work in the 'real world'.
Gust MEES's insight:

Real World!???

 

There is STILL some skill to add to that list ===> Cyber-Security skills!!! As students need to get knowledge who is tailored to the Real-World, this skill is very important!!! When having Cyber-Security skills, their employer doesn't have to invest in special training, which saves him big money!

 

And in times where Economy doesn't look that good worldwide, this is certainly a bonus point to find a new job!

 

Check also:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware On Mobile Grew 163% In 2012, Infecting Around 32.8M Android Devices, Report Says - BYOD

Malware On Mobile Grew 163% In 2012, Infecting Around 32.8M Android Devices, Report Says - BYOD | 21st Century Learning and Teaching | Scoop.it
Mobile service provider NQ Mobile today released a study of malware covering 2012, using data gathered from the company's Security Labs.

 

NQ’s data indicates that Android is a big risk for malware, but iOS has also recently come under fire for free apps that leak more personal data than on other platforms. Overall, mobile security is likely to be a growing concern, and one that could potentially become more complicated as the pace of improvements to mobile tech increases and our usage of those devices grows higher still.

 

===> For now, common sense is probably the best defense against security threats, but a more unified Android platform would help to limit malware problems as well as significantly improve developers’ lives. <===

 

Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/securite-pc-et-internet

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Mobility making it easier for insiders to take IP [Infographic]

BYOD: Mobility making it easier for insiders to take IP [Infographic] | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.
Gust MEES's insight:

 

Check it out and find other related infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security Firm Finds Bevy Of Mobile Vulnerabilities, Serious Lapses

Security Firm Finds Bevy Of Mobile Vulnerabilities, Serious Lapses | 21st Century Learning and Teaching | Scoop.it
Security firm Cenzic said it found serious mobile application vulnerabilities, such as dangerous Web service errors, in an analysis of the mobile apps it reviewed in 2012.

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.


Gust MEES's insight:

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.


Gust MEES's curator insight, March 7, 2013 5:52 PM

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.