21st Century Learning and Teaching
586.8K views | +8 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'BYOD-Risks'. Clear
Scooped by Gust MEES
Scoop.it!

U.K. data watchdog warns on BYOD risks

U.K. data watchdog warns on BYOD risks | 21st Century Learning and Teaching | Scoop.it
Bringing your own device to work may be beneficial to the worker, but what about when personal citizen data gets loaded on to such devices? British authorities are firing off the warning flares.

 

The ICO this week published its latest guidance note [PDF] on some of the risks that employers face when allowing personal devices into the enterprise. While BYOD is on the rise in the U.K., employers must still remember that the Data Protection Act—which stems from a 1995 European directive—still applies to these devices.

 

Gust MEES's insight:

 

The ICO this week published its latest guidance note [PDF] on some of the risks that employers face when allowing personal devices into the enterprise. While BYOD is on the rise in the U.K., employers must still remember that the Data Protection Act—which stems from a 1995 European directive—still applies to these devices.

 

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://www.ico.gov.uk/news/latest_news/2013/~/media/documents/library/Data_Protection/Practical_application/ico_bring_your_own_device_byod_guidance.ashx

 

Mike Hodges Eirias's curator insight, May 8, 2013 3:56 AM

So you don't have to be a big business to be affected by the DPA!

Scooped by Gust MEES
Scoop.it!

Adoption Rates of New Styles of K-12 Teaching [Infographic] - BYOD

Adoption Rates of New Styles of K-12 Teaching [Infographic] - BYOD | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

Check it out...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Dr. Jekyll Or Mr. Hyde? - Forbes

BYOD: Dr. Jekyll Or Mr. Hyde? - Forbes | 21st Century Learning and Teaching | Scoop.it
Is BYOD a blessing or a curse?, asks Emma Byrne (@SciWriBy) Enthusiasts of the Bring Your Own Device (BYOD) trend are quick to point out the benefits for tomorrow’s business. Meanwhile, detractors warn of the increased costs and security headaches.
Gust MEES's insight:

A MUST read!!!

 

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses | 21st Century Learning and Teaching | Scoop.it
People may think their shiny new smartphones and tablets are safe from hackers and malicious software, but that isn't the case, Internet security
Gust MEES's insight:

                    ===> BEWARE of the MALWARE!!! <===

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD is increasing IT frustration and loss of control

BYOD is increasing IT frustration and loss of control | 21st Century Learning and Teaching | Scoop.it

BYOD is creating new challenges for IT. The top two sources of frustration were onboarding and then supporting the increasing number and variety of personal devices, far outranking even security concerns.

 

The survey also found that IT is increasingly losing control of mobility budgets as departments assume greater responsibility for mobile initiatives. The number of enterprises in which IT manages the mobility spend has dropped to 48 percent, down from 53 percent in 2011. Forty (40) percent of companies' mobility budgets are now managed by non-IT departments.

 

Scooped by Gust MEES
Scoop.it!

BYOD And Security: The Biggest Threat Of All

A new survey has found rising interest in mobile device management platforms to address mobile security threats. Still, few IT professionals indicate a real deployment of the platforms.

 

The survey found that 34 percent of respondents considered mobile devices a serious threat to business, and 55 percent said they were thinking more about the security of corporate smartphones and tablets than they did last year.

Despite the attention given to mobile malware and attacks targeting device owners, the biggest threat to enterprises are lost and stolen devices, according to most security experts.

 

===> The survey found that 10 percent of respondents experienced data leaks following the loss or theft of mobile devices. <===

 

Gust MEES's insight:

A MUST read!

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD can put companies in legal bind: analyst

BYOD can put companies in legal bind: analyst | 21st Century Learning and Teaching | Scoop.it
Things such as remote wiping a former employee's personal device that was connected to a corporate network can land companies in legal hot water, according to Tech Research Asia principal analyst Tim Dillon.

 

Read more, a MUST:

http://www.zdnet.com/au/byod-can-put-companies-in-legal-bind-analyst-7000008396/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

MDM and BYOD: A square peg for a round hole

MDM and BYOD: A square peg for a round hole | 21st Century Learning and Teaching | Scoop.it
While mobile device management will always be in use in the enterprise, thankfully, a better option exists.

 

In fact, it seems the only group not excited about BYOD is IT – the ones who have to figure out how to keep sensitive corporate information safe. IT's consternation over BYOD is made worse by the fact that many think mobile device management (MDM) is the only tool available to contain the risks associated with BYOD, which is not the case.

 

MDM will always have a place in the enterprise because BYOD will simply never be the right approach for every employee. However, when it comes to BYOD implementations, MDM is not ideal. Thankfully, a better option exists. Mobile application management (MAM) presents an intriguing option for preparing for and avoiding the hazards of BYOD.

 

Read more, a MUST:

http://www.scmarketscope.com/mdm-and-byod-a-square-peg-for-a-round-hole/article/260623/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

The BYOD security commandments

The BYOD security commandments | 21st Century Learning and Teaching | Scoop.it

The BYOD trend will make cyber security more complex

Of the tips put forward by IDC, the first one is perhaps the most obvious and perhaps the reasons why the BYOD trend has caused so many headaches.

 

“The consensus is that BYOD is now a given. Whether you want it or not, employees will do your work on their own devices,” says Infosec commentator Stilgherrian.

 

“So your choice is whether to have a policy that acknowledges that and lays out the ground rules, or try to ban it and end up with an infestation of unknown and uncontrolled devices.”

 

However, as many enterprises are currently finding out, controlling and securing data on multiple devices is a lot easier said than done.

 

Read more, a MUST:

http://technologyspectator.com.au/byod-security-commandments

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What is your phone saying behind your back?

What is your phone saying behind your back? | 21st Century Learning and Teaching | Scoop.it

Do you always turn WiFi off on your smartphone before leaving the house or work? You might think there's no harm in having WiFi turned on but not connected to a network, but that's not necessarily the case.

 

A wireless device goes through a discovery process in which it attempts to connect to an available wireless network. This may either be ‘passive’ - listening for networks which are broadcasting themselves - or ‘active’ - sending out probe request packets in search of a network to connect to.

 

Most devices use both passive and active discovery in an attempt to connect to known/preferred networks. So it's very likely that your smartphone is broadcasting the names (SSIDs) of your favourite networks for anyone to see.

 

===> An ‘evil twin’ attack could even accomplish this without needing any knowledge of your WiFi password - very damaging for all of those who use mobile banking for instance! <===

 

Gust MEES: a MUST READ for anyone using m-Learning + "BYOD" and also any smartphone user...

 

http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD : 34% des entreprises françaises l’interdisent

BYOD : 34% des entreprises françaises l’interdisent | 21st Century Learning and Teaching | Scoop.it
Si 34% d’entreprises interdisent l’usage de terminaux personnels, elle sont également 55% à appliquer des règles strictes pour encadrer l’accès aux documents professionnels depuis ces appareils.
No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD-2012 Mobile Device Security Policy Survey

BYOD-2012 Mobile Device Security Policy Survey | 21st Century Learning and Teaching | Scoop.it
nCircle is the leading provider of automated security and compliance auditing solutions.

 

Gust MEES: while using e-Learning, m-Learning and "Bring Your Own Device" (Hashtag on Twitter = #BYOD) we need to know the dangers, risks and ALSO that NO DEVICE is perfect! ANY device containing a computer, even a mini-computer is vulnerable! Mini-computer? YES, also a smartphone with what ever OS is vulnerable as it is more a computer than a phone!

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

                   ===> Be aware of the malware!!! <===

 

Read more, a MUST:

http://www.ncircle.com/index.php?s=resources_surveys_Mobile-Security-Policy-2012

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security Firm Finds Bevy Of Mobile Vulnerabilities, Serious Lapses

Security Firm Finds Bevy Of Mobile Vulnerabilities, Serious Lapses | 21st Century Learning and Teaching | Scoop.it
Security firm Cenzic said it found serious mobile application vulnerabilities, such as dangerous Web service errors, in an analysis of the mobile apps it reviewed in 2012.

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.


Gust MEES's insight:

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.


Gust MEES's curator insight, March 7, 2013 5:52 PM

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.

 

Scooped by Gust MEES
Scoop.it!

Don't you just love mobile apps? So do malicious code writers

Don't you just love mobile apps? So do malicious code writers | 21st Century Learning and Teaching | Scoop.it
There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.

 

By now you've read about malicious apps that leak privacy data, but do you realize how serious it really is? If not, you'd better pay attention to the following statistics gathered by Symantec*. And if you think that Google Play is 100% safe, it isn't. I have some data that yields some shocking results about the number of malicious apps waiting to grab your data.


===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===


Gust MEES's insight:

 

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Gust MEES's curator insight, March 4, 2013 11:06 AM

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

alistairm 's curator insight, March 5, 2013 3:35 AM

Oh dear - the world of technology seems to be one step forward two steps back but these issues are important especially of we are going to be using mobile devices in education and promoting BYOD approaches.

alistairm 's comment, March 19, 2013 4:39 AM
Thanks all
Scooped by Gust MEES
Scoop.it!

BYOD and the Consumerization of IT

BYOD and the Consumerization of IT | 21st Century Learning and Teaching | Scoop.it
The Bring Your Own Device phenomenon is reshaping the way IT is purchased, managed, delivered, and secured. Our editors and analysts will delve into what it means, the key products involved, how to handle it, and where it’s going in the future.
Gust MEES's insight:

Lots of videos from THE experts, a MUST check out!!!

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Executive's Guide to BYOD and the Consumerization of IT (free ebook)

The Executive's Guide to BYOD and the Consumerization of IT (free ebook) | 21st Century Learning and Teaching | Scoop.it
The 'bring your own device' phenomenon is reshaping the way IT is purchased, managed, delivered, and secured. This ebook rounds up our best BYOD content and puts it all into a convenient PDF.
Gust MEES's insight:

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Before Adopting BYOD Policies, Schools Need to Do Homework | Education News

Before Adopting BYOD Policies, Schools Need to Do Homework | Education News | 21st Century Learning and Teaching | Scoop.it
Bring Your Own Device policies could be a good way for schools to digitalize the teaching environment without breaking the bank.

 

Yet, before opening up their networks to devices students bring from home, it is important that schools take steps to ensure ===>  that it’s done safely and effectively. <===


Jonathan P. Costa, Sr. – writing for EDTECH – details what the schools need to do to accomplish that goal.

Gust MEES's insight:

A MUST read!

 

Check also:

 

- - https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Top Mobile Vulnerabilities And Exploits Of 2012 - #BYOD

Top Mobile Vulnerabilities And Exploits Of 2012 - #BYOD | 21st Century Learning and Teaching | Scoop.it
Spoofing, banking attacks, authentication flaws, and more top the list of 2012's biggest mobile security headaches
Gust MEES's insight:

 

Check out also my #curation here:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Mobile-Security

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Learning basics of Cyber-Security: What You Need to Know About Mobile Security

Learning basics of Cyber-Security: What You Need to Know About Mobile Security | 21st Century Learning and Teaching | Scoop.it

Mobile Device Security: What Senior Managers Should Know


Next-generation mobile devices like iPads and Android phones can do wonders for mobile workers and drive productivity and innovation in business. However, new devices bring increased cost of administration, risk of data loss and reputation damage if they aren’t managed correctly.

 

This article provides clear, practical guidance on how you can make sure mobile ===> devices are a benefit rather than a risk for your organization. <===

 

Read more, a MUST:

http://www.sophos.com/en-us/security-news-trends/security-hubs/mobile-security/mobile-security-101.aspx

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile app downloads doubling, privacy & identity risks rise

Mobile app downloads doubling, privacy & identity risks rise | 21st Century Learning and Teaching | Scoop.it
Mobile app downloads are doubling and the apps are getting “smarter”, but the cost to users may well be a threat to their privacy and the potential sh...

 

“While these apps make our lives easier, they also give a wider group of application developers and advertising networks the ability to collect information about our activities and leverage the functionality of our devices.

 

According to Hoffman, more concerning is that many apps collect information or require permissions unnecessary for the described functionality of the app. He says this is not the first time this issue has surfaced, with reports of popular apps collecting irrelevant information or transmitting data when devices are turned off leading to significant backlash.

 

===========================================

 

Gust MEES

 

Check out also my curation:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

===========================================

 

Read more, a MUST:

http://www.itwire.com/it-industry-news/market/57270-mobile-app-downloads-doubling-privacy--identity-risks-rise

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD (Bring Your Own Device) School Policy

BYOD (Bring Your Own Device) School Policy | 21st Century Learning and Teaching | Scoop.it
Does your child bring a handheld device to school to access the Internet?

 

Read more:

http://info.uknowkids.com/blog/bid/234136/BYOD-Bring-Your-Own-Device-School-Policy

 

Erica Cruz's curator insight, October 20, 2015 2:45 PM

This article made me think about what are my school policies and guideline for safe use of a mobile device at school.  

Scooped by Gust MEES
Scoop.it!

BYOD introduces gaping security holes for businesses

BYOD introduces gaping security holes for businesses | 21st Century Learning and Teaching | Scoop.it
Bring your own device (BYOD) is gaining more and more ground within enterprises, as employees are increasingly using their personal smartphones and tablets to check email, edit documents and do other work.

 

Read more, a MUST:

http://www.infosecurity-magazine.com/view/28750/byod-introduces-gaping-security-holes-for-businesses/?utm_source=twitterfeed&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Cybercrime goes mobile - Cyberkriminalität in der mobilen Welt

Wirtschaftsspionage war noch nie so einfach. Erfahren Sie, wie eine einfache App Ihr Smartphone in ein Spionage Werkzeug verwandeln kann, welches nicht nur in der Lage ist Ihre Gespräche oder Text Nachrichten aufzunehmen, sondern sogar als „Wanze" jegliche Ihrer Aktivitäten überwachen kann.

 

Gust MEES: Check out also

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

Video in English only:

 

http://www.youtube.com/watch?v=D5DIOZzwsEc&amp;feature=related

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Mobile security stats

BYOD: Mobile security stats | 21st Century Learning and Teaching | Scoop.it
OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most concerning topics in the industry.

 

Gust MEES

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

           ===> Be aware of the malware!!! <===

 

Read more:

http://www.scmagazine.com/mobile-security-stats/slideshow/805/#0

 

No comment yet.