21st Century Learning and Teaching
586.7K views | +5 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'BYOD Policy', 'BYOD-Dangers'. Clear
Scooped by Gust MEES
Scoop.it!

Infographic: The High Cost of BYOD

Infographic: The High Cost of BYOD | 21st Century Learning and Teaching | Scoop.it
Businesses today are embracing BYOD- 75% of businesses let employees use their own devices to access the network. What threats are lurking behind this mobile revolution?
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?q=BYOD

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

Verify the security of your mobile apps

Verify the security of your mobile apps | 21st Century Learning and Teaching | Scoop.it
The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018.

 

 

 

 

 

 

 

As developers create apps to run on multiple platforms and plug into existing ERPsystems, vulnerabilities grow. From insecure data storage to improper session handling, from side channel data leakage to weak server-side controls, there are many risks to consider and robust penetration testing is an absolute must. 



Via Frederic GOUTH
Gust MEES's insight:

 

As developers create apps to run on multiple platforms and plug into existing ERPsystems, vulnerabilities grow. From insecure data storage to improper session handling, from side channel data leakage to weak server-side controls, there are many risks to consider and robust penetration testing is an absolute must. 


Check also:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Mobile-Security


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD and the Consumerization of IT

BYOD and the Consumerization of IT | 21st Century Learning and Teaching | Scoop.it
The Bring Your Own Device phenomenon is reshaping the way IT is purchased, managed, delivered, and secured. Our editors and analysts will delve into what it means, the key products involved, how to handle it, and where it’s going in the future.
Gust MEES's insight:

Lots of videos from THE experts, a MUST check out!!!

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Before Adopting BYOD Policies, Schools Need to Do Homework | Education News

Before Adopting BYOD Policies, Schools Need to Do Homework | Education News | 21st Century Learning and Teaching | Scoop.it
Bring Your Own Device policies could be a good way for schools to digitalize the teaching environment without breaking the bank.

 

Yet, before opening up their networks to devices students bring from home, it is important that schools take steps to ensure ===>  that it’s done safely and effectively. <===


Jonathan P. Costa, Sr. – writing for EDTECH – details what the schools need to do to accomplish that goal.

Gust MEES's insight:

A MUST read!

 

Check also:

 

- - https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Scooped by Gust MEES
Scoop.it!

5 Things To Know About The BYOD Trend [Infographic]

5 Things To Know About The BYOD Trend [Infographic] | 21st Century Learning and Teaching | Scoop.it

The Bring-Your-Own-Device trend makes sense. It’s cost-effective and lets students use the device they already know and love. While it may present some problems for your school or district’s IT department, it’s a great start to bringing in web 2.0 tools and apps to the classroom.

 

BYOD is getting adopted at a rapid clip these days. But thanks to a new infographic, we have a closer look at the BYOD trend. Entarasys outlines 5 key facts (on the left side of the infographic, the right side is more business-y) that teachers, students, and school administrators should know about.

 

Read more, a MUST:

http://edudemic.com/2012/10/5-things-to-know-about-the-byod-trend/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD (Bring Your Own Device) School Policy

BYOD (Bring Your Own Device) School Policy | 21st Century Learning and Teaching | Scoop.it
Does your child bring a handheld device to school to access the Internet?

 

Read more:

http://info.uknowkids.com/blog/bid/234136/BYOD-Bring-Your-Own-Device-School-Policy

 

Erica Cruz's curator insight, October 20, 2015 2:45 PM

This article made me think about what are my school policies and guideline for safe use of a mobile device at school.  

Scooped by Gust MEES
Scoop.it!

BYOD introduces gaping security holes for businesses

BYOD introduces gaping security holes for businesses | 21st Century Learning and Teaching | Scoop.it
Bring your own device (BYOD) is gaining more and more ground within enterprises, as employees are increasingly using their personal smartphones and tablets to check email, edit documents and do other work.

 

Read more, a MUST:

http://www.infosecurity-magazine.com/view/28750/byod-introduces-gaping-security-holes-for-businesses/?utm_source=twitterfeed&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Mobile security stats

BYOD: Mobile security stats | 21st Century Learning and Teaching | Scoop.it
OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most concerning topics in the industry.

 

Gust MEES

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

           ===> Be aware of the malware!!! <===

 

Read more:

http://www.scmagazine.com/mobile-security-stats/slideshow/805/#0

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: The Good, the Bad and the Ugly

BYOD: The Good, the Bad and the Ugly | 21st Century Learning and Teaching | Scoop.it

“BYOD” Bring Your own Device. A great idea that can easily turn messy.

 

Biztech has introduced the BYOD: The Good, the Bad and the Ugly infographic asking you to answer 6 easy but important questions before you launch into a BYOD situation.

 

If your company is considering allowing employees to bring their own devices to work, make sure you have a game plan in place.

BYOD has freed up many enterprises from the responsibility of exclusively purchasing and maintaining computing devices, such as notebooks, tablets and smartphones, but companies still need to have policies set in place to make things work.

BizTech magazine has put together an infographic that highlights six core questions every company should consider before moving forward with BYOD:

 

- Who buys the devices?


- What’s the right policy?


- What’s the employee’s role?


- What’s the impact on IT?


- How do we tackle security?


- How about apps?


For each of these questions, we’ve outlined a good answer, which we’d advise you to follow; a bad answer, which probably isn’t the best way to handle things; and an ugly answer, which should be avoided at all costs. Hopefully, this will help your company remain on the pleasant side of this growing workplace trend.

 

Gust MEES: please read also my FREE course here

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more:

http://www.coolinfographics.com/blog/2012/9/10/byod-the-good-the-bad-and-the-ugly.html

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

4 Rogue IT Trends to Watch Out For BYOD

4 Rogue IT Trends to Watch Out For BYOD | 21st Century Learning and Teaching | Scoop.it
Is IT becoming a consumer product?...

 

Most people are participating in rogue IT without even realizing it. By definition, rogue IT is the unmanaged hardware and software that employees bring into their offices, connect to employers’ networks and use for professional productivity on personal time. At first, it doesn’t sound so bad. By allowing employees to connect to the Wi-Fi with their own devices, companies avoid the cost of providing the hardware. But as we learned from the BYOD toolkit from CIO.gov, BYOD programs aren’t profitable if they are uncontrolled, because problems, like the ones we’ll discuss below, arise.

 

===> Rogue IT is innovative and efficient for workers, but it’s becoming a real problem for IT managers. Here are four trends that are shaking up IT: <===

 

Gust MEES: check out also my FREE course about it here

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more:

http://www.statetechmagazine.com/article/2012/09/4-rogue-it-trends-watch-out

 

Gust MEES's comment, September 9, 2012 3:54 PM
Bonsoir,

Merci pour avoir fait lke #rescoop de ma curation, mais:

Quand on #rescoop un article d'un autre curateur on le fait à 100% et on ne fait pas de la censure sur le #scoopit de cet auteur !!!

Le texte complet est sur cette curation, voici ce qui manque:

"===> Rogue IT is innovative and efficient for workers, but it’s becoming a real problem for IT managers. Here are four trends that are shaking up IT: <===

Gust MEES: check out also my FREE course about it here
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/";

Et c'est l'article complet que je veux voir avec mes remarques personnelles, et rien d'autre !!!

Si vous n'êtes pas d'accord avec mes remarques personnelles je vous conseille vivement d'effacer ce #scoopit (il est marqué avec mon nom !!!) et de prendre l'adresse originaire de le republier avec votre propre nom sans mes commentaires !!!

J'espère que l'on s'est bien compris, autrement j'attends votre commentaire de retour !!!

Bonne soirée,
Gust
Stéphane Koch's comment, September 10, 2012 2:24 AM
Cher Gust, la "curation de contenu" est basée sur la mise à disposition de contenus que l'on aura auparavant "éditorialisés", l'idée étant d'organiser et de structurer l'information afin d'en offrir une "meilleure" lisibilité. Scoopit offre, par son champs d'édition, la possibilité d’aménager/organiser l'information à sa convenance... Que l'on partage, ou repartage une info... Concernant spécifiquement cet article ont je me permets - gentiment - de rappeler que vous n'en êtes pas l'auteur. Et d'ajouter qu'il n'y avait aucune volonté de censure de ma part... La mention de votre nom fait référence à la source de ce partage, et ne vous indique en aucune cas comme étant une référence par rapport au contenu de cet article, sur lequel par ailleurs vous n'avez aucun droit de propriété, si ce n'est celui d'être justement mentionné comme source dudit partage. Ni ne vous engage juridiquement. Vous devriez plutôt prendre en compte que la mention de votre nom permet aux lecteurs de venir visiter votre propre scoopit et de s'y abonner le cas échéant, et au final d'en apprendre plus sur vous et les différents services que vous offrez... Donc s'il y avait eu une volonté de "censure" de ma part, j'aurais "rescoopé" directement l'article sans mention de l'origine de son partage, d'autant plus que dans le cas présent je n'ai pas altéré ou modifié le contenu de l'article lors de sa "réédition".

Bref, si vous n'aviez pas utilisé un ton aussi peu courtois, j'aurais accédé avec plaisir à votre demande... Je vais donc laisser les choses en l'état, étant donné que - comme mentionné précédemment - cela permettra non seulement aux lecteurs intéressés d'accéder à votre scoopit, mais aussi de lire votre commentaire, et par conséquent, ce que vous vouliez communiquer.... Voilà pour ce qui est de mon "commentaire de retour".

Pour finir, je ne peux m'empêcher de "quoter" "2001: A Space Odyssey (1968)". Je pense que c'est tout à fait approprié à la situation ;) "Look Dave, I can see you're really upset about this. I honestly think you ought to sit down calmly, take a stress pill, and think things over."
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

As BYOD Trend Grows So Do Malware Attacks

As BYOD Trend Grows So Do Malware Attacks | 21st Century Learning and Teaching | Scoop.it
As BYOD Trend Grows So Do Malware Attacks
The report found that the majority of employee’s devices did not have any form of security software loaded nor were company materials protected.

 

The BYOD concept has been a growing trend for some years now as employees become more accustomed to using their own mobile computing devices in their jobs, and accessing corporate assets.

The rapid adoption of high end smartphones and tablets including iPhones, iPads and Android devices along with the number of easily accessible apps is driving this concept forward. Cloud based services, accessible from almost anywhere, are also a key factor.

The ‘Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017’ report report from Juniper found that while this trend can bring productivity benefits to businesses, it also poses potential security risks.

 

In particular, the report found that the majority of employee’s phones and smart devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions.

 

The war on cybercrime therefore continues for many organizations and especially their IT departments and CISOs. The total number of Computer viruses, trojans and web attacks is growing at their fastest pace in four years.

 

Read more, a MUST:

http://www.infosecisland.com/blogview/22364-As-BYOD-Trend-Grows-So-Do-Malware-Attacks.html?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Infographic: Uneducated Employees and Their Seven Deadly Sins

Infographic: Uneducated Employees and Their Seven Deadly Sins | 21st Century Learning and Teaching | Scoop.it
Organizations that do not invest in security education for their employees put themselves at risk. Trustwave's infographic outlines how.

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOVhttp://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/securite-pc-et-internet

 

 Check out also "Security Education Services" from Trustwave:

- https://www.trustwave.com/security-education-services/

 

 

 

 

Read more:

https://www.trustwave.com/trustednews/2012/09/infographic-uneducated-employees-their-seven-deadly-sins

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Infographic: The High Cost of BYOD | Trustwave

Infographic: The High Cost of BYOD | Trustwave | 21st Century Learning and Teaching | Scoop.it
Businesses today are embracing BYOD- 75% of businesses let employees use their own devices to access the network. What threats are lurking behind this mobile revolution?
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=BYOD

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Dr. Jekyll Or Mr. Hyde? - Forbes

BYOD: Dr. Jekyll Or Mr. Hyde? - Forbes | 21st Century Learning and Teaching | Scoop.it
Is BYOD a blessing or a curse?, asks Emma Byrne (@SciWriBy) Enthusiasts of the Bring Your Own Device (BYOD) trend are quick to point out the benefits for tomorrow’s business. Meanwhile, detractors warn of the increased costs and security headaches.
Gust MEES's insight:

A MUST read!!!

 

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses | 21st Century Learning and Teaching | Scoop.it
People may think their shiny new smartphones and tablets are safe from hackers and malicious software, but that isn't the case, Internet security
Gust MEES's insight:

                    ===> BEWARE of the MALWARE!!! <===

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD And Security: The Biggest Threat Of All

A new survey has found rising interest in mobile device management platforms to address mobile security threats. Still, few IT professionals indicate a real deployment of the platforms.

 

The survey found that 34 percent of respondents considered mobile devices a serious threat to business, and 55 percent said they were thinking more about the security of corporate smartphones and tablets than they did last year.

Despite the attention given to mobile malware and attacks targeting device owners, the biggest threat to enterprises are lost and stolen devices, according to most security experts.

 

===> The survey found that 10 percent of respondents experienced data leaks following the loss or theft of mobile devices. <===

 

Gust MEES's insight:

A MUST read!

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Learning basics of Cyber-Security: What You Need to Know About Mobile Security

Learning basics of Cyber-Security: What You Need to Know About Mobile Security | 21st Century Learning and Teaching | Scoop.it

Mobile Device Security: What Senior Managers Should Know


Next-generation mobile devices like iPads and Android phones can do wonders for mobile workers and drive productivity and innovation in business. However, new devices bring increased cost of administration, risk of data loss and reputation damage if they aren’t managed correctly.

 

This article provides clear, practical guidance on how you can make sure mobile ===> devices are a benefit rather than a risk for your organization. <===

 

Read more, a MUST:

http://www.sophos.com/en-us/security-news-trends/security-hubs/mobile-security/mobile-security-101.aspx

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

MDM and BYOD: A square peg for a round hole

MDM and BYOD: A square peg for a round hole | 21st Century Learning and Teaching | Scoop.it
While mobile device management will always be in use in the enterprise, thankfully, a better option exists.

 

In fact, it seems the only group not excited about BYOD is IT – the ones who have to figure out how to keep sensitive corporate information safe. IT's consternation over BYOD is made worse by the fact that many think mobile device management (MDM) is the only tool available to contain the risks associated with BYOD, which is not the case.

 

MDM will always have a place in the enterprise because BYOD will simply never be the right approach for every employee. However, when it comes to BYOD implementations, MDM is not ideal. Thankfully, a better option exists. Mobile application management (MAM) presents an intriguing option for preparing for and avoiding the hazards of BYOD.

 

Read more, a MUST:

http://www.scmarketscope.com/mdm-and-byod-a-square-peg-for-a-round-hole/article/260623/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

The BYOD security commandments

The BYOD security commandments | 21st Century Learning and Teaching | Scoop.it

The BYOD trend will make cyber security more complex

Of the tips put forward by IDC, the first one is perhaps the most obvious and perhaps the reasons why the BYOD trend has caused so many headaches.

 

“The consensus is that BYOD is now a given. Whether you want it or not, employees will do your work on their own devices,” says Infosec commentator Stilgherrian.

 

“So your choice is whether to have a policy that acknowledges that and lays out the ground rules, or try to ban it and end up with an infestation of unknown and uncontrolled devices.”

 

However, as many enterprises are currently finding out, controlling and securing data on multiple devices is a lot easier said than done.

 

Read more, a MUST:

http://technologyspectator.com.au/byod-security-commandments

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What is your phone saying behind your back?

What is your phone saying behind your back? | 21st Century Learning and Teaching | Scoop.it

Do you always turn WiFi off on your smartphone before leaving the house or work? You might think there's no harm in having WiFi turned on but not connected to a network, but that's not necessarily the case.

 

A wireless device goes through a discovery process in which it attempts to connect to an available wireless network. This may either be ‘passive’ - listening for networks which are broadcasting themselves - or ‘active’ - sending out probe request packets in search of a network to connect to.

 

Most devices use both passive and active discovery in an attempt to connect to known/preferred networks. So it's very likely that your smartphone is broadcasting the names (SSIDs) of your favourite networks for anyone to see.

 

===> An ‘evil twin’ attack could even accomplish this without needing any knowledge of your WiFi password - very damaging for all of those who use mobile banking for instance! <===

 

Gust MEES: a MUST READ for anyone using m-Learning + "BYOD" and also any smartphone user...

 

http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD-2012 Mobile Device Security Policy Survey

BYOD-2012 Mobile Device Security Policy Survey | 21st Century Learning and Teaching | Scoop.it
nCircle is the leading provider of automated security and compliance auditing solutions.

 

Gust MEES: while using e-Learning, m-Learning and "Bring Your Own Device" (Hashtag on Twitter = #BYOD) we need to know the dangers, risks and ALSO that NO DEVICE is perfect! ANY device containing a computer, even a mini-computer is vulnerable! Mini-computer? YES, also a smartphone with what ever OS is vulnerable as it is more a computer than a phone!

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

                   ===> Be aware of the malware!!! <===

 

Read more, a MUST:

http://www.ncircle.com/index.php?s=resources_surveys_Mobile-Security-Policy-2012

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

CoSN examines BYOD safety and security

CoSN examines BYOD safety and security | 21st Century Learning and Teaching | Scoop.it
A new report from the Consortium for School Networking (CoSN), titled “Safe & Secure?

 

“Apps and mobile devices are being utilized more and more in education, forcing schools to reexamine their mobile device policies,” said CoSN CEO Keith Krueger. “These continuous advancements are creating an unprecedented set of safety and security challenges for school leaders, so it’s imperative that leaders are prepared and have at their fingertips a set of technical solutions to prevent data breaches and protect personal devices.”

 

Gust MEES: read also my FREE courses here

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

Read more:

http://www.eschoolnews.com/2012/09/10/cosn-examines-byod-safety-and-security/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Here are the most important aspects of BYOD to consider

Here are the most important aspects of BYOD to consider | 21st Century Learning and Teaching | Scoop.it
Here are the most important aspects of BYOD to consider before implementation.

 

 

 

 

 

 

 

 

 

 

 

Gust MEES: check out also my FREE course about it here 

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more. a MUST:

http://www.fedtechmagazine.com/article/2012/08/5-takeaways-cio-councils-byod-toolkit

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

7 Myths About BYOD Debunked

7 Myths About BYOD Debunked | 21st Century Learning and Teaching | Scoop.it
Lisa Nielsen, the author of "Teaching Generation Text: Using Cell Phones to Enhance Learning" and "The Innovative Educator" blog, believes it is time to shatter a few myths about students bringing their own devices (BYOD) to school.

 

Organizations that do not invest in security education for their employees put themselves at risk.

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOV http://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

Check out also "Security Education Services" from Trustwave:
- https://www.trustwave.com/security-education-services/

 

 

Read more:

http://thejournal.com/articles/2011/11/09/7-byod-myths.aspx?m=2&amp;amp;utm_source=buffer&amp;amp;buffer_share=4eae5

 

No comment yet.