21st Century Learning and Teaching
586.8K views | +2 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Cybersecurity'. Clear
Scooped by Gust MEES
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | 21st Century Learning and Teaching | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD

Scooped by Gust MEES
Scoop.it!

CSC Assessing the Cybersecurity Landscape in a BYOD World

CSC Assessing the Cybersecurity Landscape in a BYOD World | 21st Century Learning and Teaching | Scoop.it
Managing a company’s IT infrastructure is fast becoming an overwhelming task. Users want anytime, anywhere access. Mobile device management and shrinking budgets add to the burden.

 

 

 

 

Read more to learn about the new trend "BYOD":

 

http://www.csc.com/cybersecurity/insights/85869-aspiring_to_situational_awareness_in_security?ref=hp

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What Teachers + Educators should learn about BYOD

What Teachers + Educators should learn about BYOD | 21st Century Learning and Teaching | Scoop.it

What Teachers + Educators should learn about BYOD

 

Gust MEES:

Most of articles, blogs and Tweets witten by educational people are showing the advantages of "Bring Your Own Device" (BYOD) and they embrace very well BYOD, which I do also; but...

 

 

 

There are some more things to consider such as:

 

- A BYOD Policy in the campus, school...

 

- Prepare for BYOD in your organization 

 

Read my complete curation about it here:

http://www.scoop.it/t/21st-century-learning-and-teaching?q=BYOD

 

 

===> Read and learn also about IT-Security, YES that is a MUST in 21st Century in Education, especially when using BYOD: <===

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

Learn also about eCitizen, Digital Citizenship where Teachers should stay there as good example and knowing about their responsability:

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=eCitizen

 

Responsability as eCitizen for the Government, be a good patriot and know how to defend your Government against Cyber-Attacks and Cyberwar, why and how?

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

 

===> The above mentioned must be included in Education and especially when using BYOD, read these blogs and curated articles and you will understand that they are a MUST ;) <=== 

 

Check out also my new blog "Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure":

 

 http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Higher Education - The Perfect Security Storm

Higher Education - The Perfect Security Storm | 21st Century Learning and Teaching | Scoop.it
Institutions of higher learning need to think like businesses AND consider the enormous financial and reputational dangers of a data breach. Unlike many businesses, colleges and universities are under constant attack, from within as well as without.

 

Read more:

http://www.securityweek.com/higher-education-perfect-security-storm

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybersecurity Summary for Parents

Cybersecurity Summary for Parents | 21st Century Learning and Teaching | Scoop.it

Cybersecurity Summary for Parents

 

Learn how to help your kids use the Internet safely and responsibly...

 

Read more:

http://info.uknowkids.com/cybersecurity-summary-for-parents/Default.aspx?utm_campaign=Tip-Sheets&amp;utm_source=Blog%20Posts

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Google Produces an Informal Web Threat Report, Shares Insights

Google Produces an Informal Web Threat Report, Shares Insights | 21st Century Learning and Teaching | Scoop.it
Google has shared some interesting Web security statistics, and while the information was not published as an official “threat report”, the company has provided some insight into the growth of malicious activity across the Web.

 

he company provides a free and public Safe Browsing API that allows other organizations to keep their users safe by using the data Google has compiled.

 

• Google said it discovers about 9,500 new malicious websites every day – These sites could be either innocent sites that have been compromised by cybercriminals, or purpose-built sites designed for malware distribution or phishing.

 

• Approximately 12-14 million Google Search queries per day show warnings in order to caution users from going to sites that may be compromised.

 

• Google provides malware warnings for about 300,000 downloads per day through its Chrome download protection service.

 

• Google also sends thousands of notifications daily to Internet Service Providers (ISPs) & CERTs to help them keep their networks clean.

 

Read more:

http://www.securityweek.com/google-produces-informal-web-threat-report-shares-insights

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

How to Avoid 17 Internet Scams [INFOGRAPHIC]

How to Avoid 17 Internet Scams [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
All over the world, Internet scams abound. Check out this infographic for tips on how to ensure that you don't fall prey to a scheme.

 

Read more:

http://mashable.com/2012/06/17/internet-scams-infographic/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Tackling cybersecurity together > Microsoft Europe

Tackling cybersecurity together > Microsoft Europe | 21st Century Learning and Teaching | Scoop.it
Where Europe succeeds, we succeed

Europe matters to us. For the past thirty years, it’s been our aim to help fuel the European economy...

 

The Web has prompted tremendous growth and innovation over the last two decades, but also a new set of challenges.

 

Cybersecurity has emerged as a significant global threat. Every day more than a million people are successfully targeted by cyber criminals.

 

===> That’s a new victim every 14 seconds. <===

 

Malicious attacks are mushrooming and conservative estimates put the annual cost of cybercrime at $114 billion. Given this, it’s hardly surprising that the World Economic Forum’s Risk Response Network recently elevated cybersecurity to a top five global risk, alongside issues such as income inequality, rising greenhouse gas emissions and fiscal imbalances.

 

Gust MEES: in the word ICT = "I", meaning "Information", so this is necessary in Education especially! IT-Security in 21st Century is a need to get included in curriculum, it's the responsibility of Education to teach IT-Security and Internet-Safety...

By knowing that every 14 seconds there is a new victim to cybercriminals I hope that educators and teachers will see the importance of preparing best their learners to be best protected, even if they need to learn themselves about it, we are ALL "Life Long Learners" ;)

 

Read more:

http://www.microsoft.eu/digital-policy/posts/tackling-cybersecurity-together.aspx

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

4 Tips to Protect Your Small Business Against Cyberattacks

4 Tips to Protect Your Small Business Against Cyberattacks | 21st Century Learning and Teaching | Scoop.it
Cyberattacks -- including hacks and data theft -- aren't just for big companies. Here are steps you can take to protect your small business.

 

Gust MEES: A MUST READ also for Education!

 

Read more:

http://mashable.com/2012/06/10/small-business-cybersecurity/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

5 Ways to Connect Safely on Vacation

5 Ways to Connect Safely on Vacation | 21st Century Learning and Teaching | Scoop.it

84.6% of 21st century vacationers use their mobile devices to check their email, according to Prosper Mobile Insights. The thought of being without a smartphone, tablet or a computer, even while off in a foreign country, is a foreign thought for most of us. And if you’re always connected, you’re always at risk of some online nastiness.

 

Gust MEES: check out also my free course here http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Read more:

http://safeandsavvy.f-secure.com/2012/06/06/5-ways-to-stay-safe-online-during-your-well-deserved-vacation/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What should get be taught and learned more in 21st Century while using ICT?

What should get be taught and learned more in 21st Century while using ICT? | 21st Century Learning and Teaching | Scoop.it

Possible instructions for educators on how they can work together with the learners. Knowing the tools for 21st Century Learning is primordial to give quality courses. 

 

One very important knowledge who needs to get taught is “Critical Thinking”; it brings out also new ideas and the courage to become an engager and helps to try to build a better world in both worlds: “Real World” and “Virtual World” (Internet)!

 

Can YOU drive a car (and this also safely) ONLY by getting theoretical courses and advice? YOU would surprise me, seriously, a BIG LOL for that. So how YOU will expect that someone could surf secure with his computer as it is “visually seen” the “vehicle” with whom users are driving on the “Data High Way” (Internet)!???

 

There is a need for practice, how!?

 

Find out more ideas, critical thinking and practice:

http://gustmees.wordpress.com/2012/05/28/what-should-get-be-taught-and-learned-more-in-21st-century-while-using-ict/

 

Gust MEES's comment, May 28, 2012 6:07 PM
Hi,

Thanks very much to spread this #criticalthinking and hopefully we will see in next future practical courses about #itsecurity ;) Have a nice week:
Gust
Mário Reis's comment, May 28, 2012 6:14 PM
Thank you Gust, and keep on feeding me awesome content!
Scooped by Gust MEES
Scoop.it!

Netsafe NetBasics

Netsafe NetBasics | 21st Century Learning and Teaching | Scoop.it

Netsafe Netbasics:

 

Nicely-done videos about internet safety

 

Check out here:

http://www.netbasics.org.nz/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The current state of the cybercrime ecosystem' featuring Mikko Hypponen

The current state of the cybercrime ecosystem' featuring Mikko Hypponen | 21st Century Learning and Teaching | Scoop.it
By Dancho Danchev | May 25, 2012, 7:20am PDT

 

In this week’s Q&A, I chat with Mikko Hypponen, the Chief Research Officer of F-Secure on the current state of the cybercrime ecosystem.

 

Gust MEES: A MUST READ

 

Read more:

http://www.zdnet.com/blog/security/q-a-of-the-week-the-current-state-of-the-cybercrime-ecosystem-featuring-mikko-hypponen/12147

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Is BYOD a Nightmare for IT Security or a Dream Come True?

Is BYOD a Nightmare for IT Security or a Dream Come True? | 21st Century Learning and Teaching | Scoop.it
Is BYOD a Nightmare for IT Security or a Dream Come True?


While you still may be debating whether or not to allow employees to use their own smartphones or tables for work, many organizations realize that they may not have a choice.

 

Read more:

http://www.infosecisland.com/blogview/21671-Is-BYOD-a-Nightmare-for-IT-Security-or-a-Dream-Come-True.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BrightTALK Webcast - Mobile Security Summit July12

BrightTALK Webcast - Mobile Security Summit July12 | 21st Century Learning and Teaching | Scoop.it

Why Mobile Device Management Needs Mobile Security... A MUST for "Bring Your Own Device" (BYOD)!

 

Read more:

http://www.websense.com/content/brighttalk-mobile-security-webcast.aspx?cmpid=prtw

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Parents urged to teach Internet safety

Parents urged to teach Internet safety | 21st Century Learning and Teaching | Scoop.it
With time on their hands, students turn to the Internet more during summer and that has law enforcement issuing a warning to parents: If you haven't talked to your kids about online safety already, the time is now.

 

 

 

 

===> "What we're saying is educate the kids about the dangers on the Internet." <===

 

Gust MEES: check out also my free courses about IT-Security where you learn by easy to follow steps how to secure your computer:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security/

 

- http://gustmees.wordpress.com/2012/05/27/visual-it-securityteachers-worksheet-part1/

 

  

http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/

 

  

My free courses show you HowTo stay more secure and the proposed programs don't need a lot of time to work with it...

 

Read more:

http://www2.tbo.com/lifestyles/life/2012/jun/25/memeto2-parents-urged-to-teach-internet-safety-ar-419977/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Which is the most popular antivirus software?

Which is the most popular antivirus software? | 21st Century Learning and Teaching | Scoop.it
Using a data set consisting of 120,000 data points, researchers from OPSWAT estimate that Avast is the market share leader in the antivirus software market.

 

Gust MEES:

 

1.) IT-Security, Internet-Safety, Online-Safety, Cyber-Security are a need and a MUST for 21st Century Teaching and Learning! That's why this article is mentioned in this Topic!!!

 

2.) other companies not mentioned should perhaps make more efforts on "Social Media" and get more "social" as well to be present on main PC Magazines + Mac Magazines for a better marketing of their products! Critical Thinking, sorry ;) Learn that the customer doesn't need to go to you, but that YOU should go to the customer ;)

 

Read more:

http://www.zdnet.com/blog/security/which-is-the-most-popular-antivirus-software/12608

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybersecurity in 2012: the good, the bad, and the really ugly

Cybersecurity in 2012: the good, the bad, and the really ugly | 21st Century Learning and Teaching | Scoop.it
Cyberwar, cybercrime, cyberattack. We’re hearing about it all the time. The fact is, it’s not going away. Not by a long shot.

 

Cyberwar, cybercrime, cyberattack. We’re hearing about it all the time. From new bills before Congress to new technologies designed to protect us, just how safe are we?

 

We’re under assault from nation states, organized crime gangs, terrorists, hacktivists, for-profit corporations, and even the pimply-faced teenager down the street. When will it all just go away?

 

===> The fact is, it’s not going away. Not by a long shot. <===

 

Phishing, spamming, distributed denial of service attacks, worms, malware, intrusion, exfiltration — all of these describe various forms of assault on our computers, servers, phones, and bank accounts.

 

===> Even our smartphones are being compromised at a disturbing rate. <===

 

Read more :

http://www.zdnet.com/blog/government/cybersecurity-in-2012-the-good-the-bad-and-the-really-ugly/11294

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybersecurity education should start early

Cybersecurity education should start early | 21st Century Learning and Teaching | Scoop.it
Students ought to be taught cybersecurity knowhow as soon as tech is introduced to them, and such courses should be holistic to include ethical and societal impacts, observers say.

 

Read more:

http://www.zdnetasia.com/cybersecurity-education-should-start-early-62305154.htm

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

New site offers a whole new approach to online safety | eSchool News

New site offers a whole new approach to online safety | eSchool News | 21st Century Learning and Teaching | Scoop.it
While schools are right in teaching students about the dangers that exist online, a new website aims to promote the benefits of internet use—as well as bridge the generational gap in online use and knowledge between youth and their teachers and...

 

Gust MEES: A very good approach which I agree too, but the need of learning IT-Security is still there and a MUST!

 

Critical-Thinking: Existing problems don't go away with a makeup ;) Internet will not look more sexy after that, sorry...

 

Protect your computer and you protect ALSO the community on Internet, check my free courses to learn more:

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

- http://gustmees.wordpress.com/2012/05/26/visual-it-securitylearn-with-videos/

 

 

 

-  http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

 

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Five IT security threats and how to combat them

Five IT security threats and how to combat them | 21st Century Learning and Teaching | Scoop.it

Faced with external security threats from hackers and others, along with a growing array of even more dangerous internal security threats, companies worldwide are feeling the heat.

 

Organizations traditionally have had only two options to address identity and access management:

 

1. Internal excessive privilege - System Administrators with complete access to servers and data can pose a tremendous internal threat if they turn against the company. Similarly, everyone from admins up to executives poses a threat to security and data if they maintain excessive access rights after changing positions or taking on different roles.

 

2. Third party access - Giving partners and other third parties appropriate access to data is no longer cut and dried. Data stored in the cloud may be located across the country or overseas—or sit on physical servers owned by one vendor, but housed in facilities owned by any number of data centers. Employees of these third parties often have direct access to unencrypted data, or they may retain copies of both encrypted or unencrypted data.

 

3. Hacktivism - Politically motivated hacking is on the rise. Members of various groups assert that much of their success comes not from their technical expertise, but from having found easy targets. While an organization may not have control over whether or not it is attacked, effective identity and access management strategies and technologies, and basic employee security training, will reduce the chances that attacks will succeed.

 

4. Social engineering - Social engineering is the age-old technique of using lies, deception and manipulation to gain sufficient knowledge to dupe an unwary employee or company. Using public social channels to detail every aspect of your upcoming “unplugged” vacation trip may be just what a scammer needs to put an attack in motion.

 

5. Internal negligence - Negligence typically is an offense committed by management when “they should have known better.” Most successful data security breaches have some element of managerial negligence associated with them, such as simply forgetting to check log reports for clearly suspicious patterns.

 

Gust MEES: A MUST READ for Education and Business!

 

Read more:

http://www.net-security.org/secworld.php?id=13084&amp;amp;utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

SC Spotlight on Mobile Security

SC Spotlight on Mobile Security | 21st Century Learning and Teaching | Scoop.it

Mobility is empowering individuals and boosting productivity. But these advantages are offset by another vision of mobility as an unchained malady - multiplying the threat environment and thus making securing the enterprise even harder to manage.

 

As companies continue to embrace mobility and BYOD, what are the myriad security implications that result and how can CSOs properly address these? With a number of up-to-the-minute feature stories, plus a Q&A with leading CSOs, and a case study detailing an enterprise mobile implementation, we explore these issues and more in this special Spotlight edition of SC Magazine.

 

Gust MEES: you need to complete a form first to download the requested PDF document, but it is worth to read for best #BYOD and also #itsecurity...

 

Read more:

http://forms.madisonlogic.com/Form.aspx?pub=18&amp;pgr=259&amp;src=2397&amp;ctg=15&amp;ast=19699&amp;crv=0&amp;cmp=5619&amp;frm=446&amp;autodn=1&amp;yld=0

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The top 5 security threats to your company

The top 5 security threats to your company | 21st Century Learning and Teaching | Scoop.it
Security threats: time-consuming, expensive, and an all-around headache for your IT organization. Here are the five big ones to look out for.

 

Read more:

http://www.zdnet.com/blog/btl/the-top-5-security-threats-to-your-company/79663

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Visual IT-Security/Worksheet-Secure Surfing

Visual IT-Security/Worksheet-Secure Surfing | 21st Century Learning and Teaching | Scoop.it

Possible instructions for educators on how they can work together with the learners. Knowing the tools for 21st Century Learning is primordial to give quality courses.  Learning and teaching ...

 

How-To do it and who to do it?


I suggest, if possible, to do this by any teacher, educator on the beginning of a new school year: There are no special technical skills needed and it takes ONLY 5-10 minutes to show the learners how-to use this application! If there are summer camps where some of the learners are present, do it also and ask them to share it with their class over Social Medias, such as Facebook, Twitter and others…

Talk also to your System Administrator on School to install this FREE application on any used computer and tablets to have the same standard in the school! Your and your students #virtuallife (Internet) would become more secure…

 

===> Less stress to find trustworthy web sites is also more time for teaching and learning! And you will help the COMMUNITY to surf more secure also… <===

 

Read more and use it, please:

http://gustmees.wordpress.com/2012/05/27/visual-it-securityteachers-worksheet-part1/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What You Need to Know About Mobile Malware

What You Need to Know About Mobile Malware | 21st Century Learning and Teaching | Scoop.it

Last week we told you how to protect yourself from mobile malware http://safeandsavvy.f-secure.com/2012/05/08/5-ways-to-keep-your-mobile-phone-safe/

 

 

 For people who want to go a step further and understand the threats your smartphone faces, we’re going to take a quick look inside the F-Secure Mobile Threat Report Q1 2012. What you’ll find is a Android landscape where threats are quickly maturing.

 

Read more:

http://safeandsavvy.f-secure.com/2012/05/18/what-you-need-to-know-about-mobile-malware/

 

No comment yet.