21st Century Learning and Teaching
586.8K views | +0 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'BYOD Policy', 'Cybersecurity'. Clear
Scooped by Gust MEES
Scoop.it!

BYOD: Dr. Jekyll Or Mr. Hyde? - Forbes

BYOD: Dr. Jekyll Or Mr. Hyde? - Forbes | 21st Century Learning and Teaching | Scoop.it
Is BYOD a blessing or a curse?, asks Emma Byrne (@SciWriBy) Enthusiasts of the Bring Your Own Device (BYOD) trend are quick to point out the benefits for tomorrow’s business. Meanwhile, detractors warn of the increased costs and security headaches.
Gust MEES's insight:

A MUST read!!!

 

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses | 21st Century Learning and Teaching | Scoop.it
People may think their shiny new smartphones and tablets are safe from hackers and malicious software, but that isn't the case, Internet security
Gust MEES's insight:

                    ===> BEWARE of the MALWARE!!! <===

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Don’t Let BYOD become BYOV (Bring your own viruses)

Don’t Let BYOD become BYOV (Bring your own viruses) | 21st Century Learning and Teaching | Scoop.it
The return of IM worms, such as the recent Skype threat, underscores a risk that IT managers face in an increasingly BYO world.

 

It was an early form of consumerization with people bringing the applications they used in their personal lives into the workplace. Call it a “BYOA” approach: Bring Your Own Application. Always being ready to adapt to emerging trends, attackers started crafting malware that would exploit the weaknesses these new applications introduced into the workplace. Attackers adapted methods that worked so well with email worms like the ILOVEYOU worm of 2000 to create a new kind of worm that could spread even faster over IM networks.

 

============================================

 

Gust MEES

 

Check out also my curation and my FREE course about it:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=BYOD

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

============================================

 

Read more, a MUST:

http://consumerization.trendmicro.com/dont-let-byod-become-byov-bring-your-own-viruses/

 

 

Francoise Rieffel's curator insight, August 7, 2013 6:19 AM

add your insight...

 

 

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

The BYOD security commandments

The BYOD security commandments | 21st Century Learning and Teaching | Scoop.it

The BYOD trend will make cyber security more complex

Of the tips put forward by IDC, the first one is perhaps the most obvious and perhaps the reasons why the BYOD trend has caused so many headaches.

 

“The consensus is that BYOD is now a given. Whether you want it or not, employees will do your work on their own devices,” says Infosec commentator Stilgherrian.

 

“So your choice is whether to have a policy that acknowledges that and lays out the ground rules, or try to ban it and end up with an infestation of unknown and uncontrolled devices.”

 

However, as many enterprises are currently finding out, controlling and securing data on multiple devices is a lot easier said than done.

 

Read more, a MUST:

http://technologyspectator.com.au/byod-security-commandments

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Bring Your Own Device | The White House

Bring Your Own Device | The White House | 21st Century Learning and Teaching | Scoop.it

A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs


August 23, 2012

Product of the Digital Services Advisory Group and Federal Chief Information Officers Council

 

Read more:

http://www.whitehouse.gov/digitalgov/bring-your-own-device

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Mobile security stats

BYOD: Mobile security stats | 21st Century Learning and Teaching | Scoop.it
OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most concerning topics in the industry.

 

Gust MEES

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

           ===> Be aware of the malware!!! <===

 

Read more:

http://www.scmagazine.com/mobile-security-stats/slideshow/805/#0

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: The Good, the Bad and the Ugly

BYOD: The Good, the Bad and the Ugly | 21st Century Learning and Teaching | Scoop.it

“BYOD” Bring Your own Device. A great idea that can easily turn messy.

 

Biztech has introduced the BYOD: The Good, the Bad and the Ugly infographic asking you to answer 6 easy but important questions before you launch into a BYOD situation.

 

If your company is considering allowing employees to bring their own devices to work, make sure you have a game plan in place.

BYOD has freed up many enterprises from the responsibility of exclusively purchasing and maintaining computing devices, such as notebooks, tablets and smartphones, but companies still need to have policies set in place to make things work.

BizTech magazine has put together an infographic that highlights six core questions every company should consider before moving forward with BYOD:

 

- Who buys the devices?


- What’s the right policy?


- What’s the employee’s role?


- What’s the impact on IT?


- How do we tackle security?


- How about apps?


For each of these questions, we’ve outlined a good answer, which we’d advise you to follow; a bad answer, which probably isn’t the best way to handle things; and an ugly answer, which should be avoided at all costs. Hopefully, this will help your company remain on the pleasant side of this growing workplace trend.

 

Gust MEES: please read also my FREE course here

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more:

http://www.coolinfographics.com/blog/2012/9/10/byod-the-good-the-bad-and-the-ugly.html

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

4 Rogue IT Trends to Watch Out For BYOD

4 Rogue IT Trends to Watch Out For BYOD | 21st Century Learning and Teaching | Scoop.it
Is IT becoming a consumer product?...

 

Most people are participating in rogue IT without even realizing it. By definition, rogue IT is the unmanaged hardware and software that employees bring into their offices, connect to employers’ networks and use for professional productivity on personal time. At first, it doesn’t sound so bad. By allowing employees to connect to the Wi-Fi with their own devices, companies avoid the cost of providing the hardware. But as we learned from the BYOD toolkit from CIO.gov, BYOD programs aren’t profitable if they are uncontrolled, because problems, like the ones we’ll discuss below, arise.

 

===> Rogue IT is innovative and efficient for workers, but it’s becoming a real problem for IT managers. Here are four trends that are shaking up IT: <===

 

Gust MEES: check out also my FREE course about it here

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more:

http://www.statetechmagazine.com/article/2012/09/4-rogue-it-trends-watch-out

 

Gust MEES's comment, September 9, 2012 3:54 PM
Bonsoir,

Merci pour avoir fait lke #rescoop de ma curation, mais:

Quand on #rescoop un article d'un autre curateur on le fait à 100% et on ne fait pas de la censure sur le #scoopit de cet auteur !!!

Le texte complet est sur cette curation, voici ce qui manque:

"===> Rogue IT is innovative and efficient for workers, but it’s becoming a real problem for IT managers. Here are four trends that are shaking up IT: <===

Gust MEES: check out also my FREE course about it here
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/";

Et c'est l'article complet que je veux voir avec mes remarques personnelles, et rien d'autre !!!

Si vous n'êtes pas d'accord avec mes remarques personnelles je vous conseille vivement d'effacer ce #scoopit (il est marqué avec mon nom !!!) et de prendre l'adresse originaire de le republier avec votre propre nom sans mes commentaires !!!

J'espère que l'on s'est bien compris, autrement j'attends votre commentaire de retour !!!

Bonne soirée,
Gust
Stéphane Koch's comment, September 10, 2012 2:24 AM
Cher Gust, la "curation de contenu" est basée sur la mise à disposition de contenus que l'on aura auparavant "éditorialisés", l'idée étant d'organiser et de structurer l'information afin d'en offrir une "meilleure" lisibilité. Scoopit offre, par son champs d'édition, la possibilité d’aménager/organiser l'information à sa convenance... Que l'on partage, ou repartage une info... Concernant spécifiquement cet article ont je me permets - gentiment - de rappeler que vous n'en êtes pas l'auteur. Et d'ajouter qu'il n'y avait aucune volonté de censure de ma part... La mention de votre nom fait référence à la source de ce partage, et ne vous indique en aucune cas comme étant une référence par rapport au contenu de cet article, sur lequel par ailleurs vous n'avez aucun droit de propriété, si ce n'est celui d'être justement mentionné comme source dudit partage. Ni ne vous engage juridiquement. Vous devriez plutôt prendre en compte que la mention de votre nom permet aux lecteurs de venir visiter votre propre scoopit et de s'y abonner le cas échéant, et au final d'en apprendre plus sur vous et les différents services que vous offrez... Donc s'il y avait eu une volonté de "censure" de ma part, j'aurais "rescoopé" directement l'article sans mention de l'origine de son partage, d'autant plus que dans le cas présent je n'ai pas altéré ou modifié le contenu de l'article lors de sa "réédition".

Bref, si vous n'aviez pas utilisé un ton aussi peu courtois, j'aurais accédé avec plaisir à votre demande... Je vais donc laisser les choses en l'état, étant donné que - comme mentionné précédemment - cela permettra non seulement aux lecteurs intéressés d'accéder à votre scoopit, mais aussi de lire votre commentaire, et par conséquent, ce que vous vouliez communiquer.... Voilà pour ce qui est de mon "commentaire de retour".

Pour finir, je ne peux m'empêcher de "quoter" "2001: A Space Odyssey (1968)". Je pense que c'est tout à fait approprié à la situation ;) "Look Dave, I can see you're really upset about this. I honestly think you ought to sit down calmly, take a stress pill, and think things over."
Scooped by Gust MEES
Scoop.it!

Cybercrime goes mobile [Infographic in pdf]

The Norton Cybercrime Report is out for 2012! Cybercrime continues to have far-reaching effects and is increasingly a problem on mobile devices and in our social networks (where we seem to be less vigilant).

 

After surveying more than 13,000 consumers in 24 countries, the researchers found that the numbers of online adults increased by 20 percent from last year, and that cybercrime impacted just under &frac12; of them in the previous 12 months. The total direct consumer cost was calculated to be $110 billion, slightly down from last year’s $114 billion (USD), with the average cost per victim down approximately 20 percent. The reason the overall cost remains so high is that the pool of victimized online adults grew more rapidly - in other words, less money, but from more victims.

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

7 Myths About BYOD Debunked

7 Myths About BYOD Debunked | 21st Century Learning and Teaching | Scoop.it
Lisa Nielsen, the author of "Teaching Generation Text: Using Cell Phones to Enhance Learning" and "The Innovative Educator" blog, believes it is time to shatter a few myths about students bringing their own devices (BYOD) to school.

 

Organizations that do not invest in security education for their employees put themselves at risk.

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOV http://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

- http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

Check out also "Security Education Services" from Trustwave:
- https://www.trustwave.com/security-education-services/

 

 

Read more:

http://thejournal.com/articles/2011/11/09/7-byod-myths.aspx?m=2&amp;amp;utm_source=buffer&amp;amp;buffer_share=4eae5

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

How to Launch a Successful BYOD Program

How to Launch a Successful BYOD Program | 21st Century Learning and Teaching | Scoop.it


Katy Independent School District (ISD) has a student population of 63,000 students and 56 schools – elementary, middle and high schools. There are 83 languages spoken by students in the district and 31 percent of the student population is on free or reduced lunch programs.

 

In 2009, Katy began a three-year plan to change instruction in the school district by promoting a standardized toolbox of web-based tools dubbed “Web 2.0.” They also set out guidelines for behavior in the digital space called “Digital Citizenship,” in the hopes that the school would not just teach kids math and reading, but also how to behave in a public digital world.

 

Gust MEES: while using "Bring Your Own Device" (Hashtag on Twitter = #BYOD) you must also take care about IT-Security and Privacy! Check my FREE course who explains in detail:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Read more:

http://knolinfos.visibli.com/share/ZcOoM3

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Spyware Takes Over iPhones, Androids

Spyware Takes Over iPhones, Androids | 21st Century Learning and Teaching | Scoop.it
DFI News Digital Forensic Investigator is a multi-media resource for digital forensic professionals working in academic, government, law enforcement, and corporate settings.

 

Call it Invasion of the iPhone Snatchers: a new FinFisher-based spyware is built to infect iPhones and iPads (and Android, BlackBerry and Windows Phone gadgets too) in order to take over the device completely — all unbeknownst to the user.

 

The smartphones and tablets will innocently appear to be themselves, but in reality the mobile malware is working in the background to track the device’s location, monitor activity and intercept communications including emails, voice calls and text messages.

 

Gust MEES: in Education we use Internet for e-Learning + m-Learning and also we embrace "Bring Your Own Device" (Twitter Hashtag = #BYOD), so we need to know also about the dangers, risks and threats with it! That's our responsibility against our learners (students) and we need to learn the basics of IT-Security and share our knowledge and help our learners when security problems occur ;)

 

Read also my FREE courses about basic IT-Security (easy to learn, ONLY change your habits...):

 


- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

 

Read more:

http://www.dfinews.com/news/spyware-takes-over-iphones-androids?et_cid=2825646&amp;amp;et_rid=454853272&amp;amp;linkid=http%3A%2F%2Fwww.dfinews.com%2Fnews%2Fspyware-takes-over-iphones-androids#.UEDceehnFCE.twitter

 

Scooped by Gust MEES
Scoop.it!

BYOD and the Consumerization of IT

BYOD and the Consumerization of IT | 21st Century Learning and Teaching | Scoop.it
The Bring Your Own Device phenomenon is reshaping the way IT is purchased, managed, delivered, and secured. Our editors and analysts will delve into what it means, the key products involved, how to handle it, and where it’s going in the future.
Gust MEES's insight:

Lots of videos from THE experts, a MUST check out!!!

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD And Security: The Biggest Threat Of All

A new survey has found rising interest in mobile device management platforms to address mobile security threats. Still, few IT professionals indicate a real deployment of the platforms.

 

The survey found that 34 percent of respondents considered mobile devices a serious threat to business, and 55 percent said they were thinking more about the security of corporate smartphones and tablets than they did last year.

Despite the attention given to mobile malware and attacks targeting device owners, the biggest threat to enterprises are lost and stolen devices, according to most security experts.

 

===> The survey found that 10 percent of respondents experienced data leaks following the loss or theft of mobile devices. <===

 

Gust MEES's insight:

A MUST read!

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Learning basics of Cyber-Security: What You Need to Know About Mobile Security

Learning basics of Cyber-Security: What You Need to Know About Mobile Security | 21st Century Learning and Teaching | Scoop.it

Mobile Device Security: What Senior Managers Should Know


Next-generation mobile devices like iPads and Android phones can do wonders for mobile workers and drive productivity and innovation in business. However, new devices bring increased cost of administration, risk of data loss and reputation damage if they aren’t managed correctly.

 

This article provides clear, practical guidance on how you can make sure mobile ===> devices are a benefit rather than a risk for your organization. <===

 

Read more, a MUST:

http://www.sophos.com/en-us/security-news-trends/security-hubs/mobile-security/mobile-security-101.aspx

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

MDM and BYOD: A square peg for a round hole

MDM and BYOD: A square peg for a round hole | 21st Century Learning and Teaching | Scoop.it
While mobile device management will always be in use in the enterprise, thankfully, a better option exists.

 

In fact, it seems the only group not excited about BYOD is IT – the ones who have to figure out how to keep sensitive corporate information safe. IT's consternation over BYOD is made worse by the fact that many think mobile device management (MDM) is the only tool available to contain the risks associated with BYOD, which is not the case.

 

MDM will always have a place in the enterprise because BYOD will simply never be the right approach for every employee. However, when it comes to BYOD implementations, MDM is not ideal. Thankfully, a better option exists. Mobile application management (MAM) presents an intriguing option for preparing for and avoiding the hazards of BYOD.

 

Read more, a MUST:

http://www.scmarketscope.com/mdm-and-byod-a-square-peg-for-a-round-hole/article/260623/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD introduces gaping security holes for businesses

BYOD introduces gaping security holes for businesses | 21st Century Learning and Teaching | Scoop.it
Bring your own device (BYOD) is gaining more and more ground within enterprises, as employees are increasingly using their personal smartphones and tablets to check email, edit documents and do other work.

 

Read more, a MUST:

http://www.infosecurity-magazine.com/view/28750/byod-introduces-gaping-security-holes-for-businesses/?utm_source=twitterfeed&amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

What is your phone saying behind your back?

What is your phone saying behind your back? | 21st Century Learning and Teaching | Scoop.it

Do you always turn WiFi off on your smartphone before leaving the house or work? You might think there's no harm in having WiFi turned on but not connected to a network, but that's not necessarily the case.

 

A wireless device goes through a discovery process in which it attempts to connect to an available wireless network. This may either be ‘passive’ - listening for networks which are broadcasting themselves - or ‘active’ - sending out probe request packets in search of a network to connect to.

 

Most devices use both passive and active discovery in an attempt to connect to known/preferred networks. So it's very likely that your smartphone is broadcasting the names (SSIDs) of your favourite networks for anyone to see.

 

===> An ‘evil twin’ attack could even accomplish this without needing any knowledge of your WiFi password - very damaging for all of those who use mobile banking for instance! <===

 

Gust MEES: a MUST READ for anyone using m-Learning + "BYOD" and also any smartphone user...

 

http://nakedsecurity.sophos.com/2012/10/02/what-is-your-phone-saying-behind-your-back/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD-2012 Mobile Device Security Policy Survey

BYOD-2012 Mobile Device Security Policy Survey | 21st Century Learning and Teaching | Scoop.it
nCircle is the leading provider of automated security and compliance auditing solutions.

 

Gust MEES: while using e-Learning, m-Learning and "Bring Your Own Device" (Hashtag on Twitter = #BYOD) we need to know the dangers, risks and ALSO that NO DEVICE is perfect! ANY device containing a computer, even a mini-computer is vulnerable! Mini-computer? YES, also a smartphone with what ever OS is vulnerable as it is more a computer than a phone!

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

                   ===> Be aware of the malware!!! <===

 

Read more, a MUST:

http://www.ncircle.com/index.php?s=resources_surveys_Mobile-Security-Policy-2012

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

CoSN examines BYOD safety and security

CoSN examines BYOD safety and security | 21st Century Learning and Teaching | Scoop.it
A new report from the Consortium for School Networking (CoSN), titled “Safe & Secure?

 

“Apps and mobile devices are being utilized more and more in education, forcing schools to reexamine their mobile device policies,” said CoSN CEO Keith Krueger. “These continuous advancements are creating an unprecedented set of safety and security challenges for school leaders, so it’s imperative that leaders are prepared and have at their fingertips a set of technical solutions to prevent data breaches and protect personal devices.”

 

Gust MEES: read also my FREE courses here

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

Read more:

http://www.eschoolnews.com/2012/09/10/cosn-examines-byod-safety-and-security/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Here are the most important aspects of BYOD to consider

Here are the most important aspects of BYOD to consider | 21st Century Learning and Teaching | Scoop.it
Here are the most important aspects of BYOD to consider before implementation.

 

 

 

 

 

 

 

 

 

 

 

Gust MEES: check out also my FREE course about it here 

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more. a MUST:

http://www.fedtechmagazine.com/article/2012/08/5-takeaways-cio-councils-byod-toolkit

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

As BYOD Trend Grows So Do Malware Attacks

As BYOD Trend Grows So Do Malware Attacks | 21st Century Learning and Teaching | Scoop.it
As BYOD Trend Grows So Do Malware Attacks
The report found that the majority of employee’s devices did not have any form of security software loaded nor were company materials protected.

 

The BYOD concept has been a growing trend for some years now as employees become more accustomed to using their own mobile computing devices in their jobs, and accessing corporate assets.

The rapid adoption of high end smartphones and tablets including iPhones, iPads and Android devices along with the number of easily accessible apps is driving this concept forward. Cloud based services, accessible from almost anywhere, are also a key factor.

The ‘Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017’ report report from Juniper found that while this trend can bring productivity benefits to businesses, it also poses potential security risks.

 

In particular, the report found that the majority of employee’s phones and smart devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions.

 

The war on cybercrime therefore continues for many organizations and especially their IT departments and CISOs. The total number of Computer viruses, trojans and web attacks is growing at their fastest pace in four years.

 

Read more, a MUST:

http://www.infosecisland.com/blogview/22364-As-BYOD-Trend-Grows-So-Do-Malware-Attacks.html?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Infographic: Uneducated Employees and Their Seven Deadly Sins

Infographic: Uneducated Employees and Their Seven Deadly Sins | 21st Century Learning and Teaching | Scoop.it
Organizations that do not invest in security education for their employees put themselves at risk. Trustwave's infographic outlines how.

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOVhttp://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/securite-pc-et-internet

 

 Check out also "Security Education Services" from Trustwave:

- https://www.trustwave.com/security-education-services/

 

 

 

 

Read more:

https://www.trustwave.com/trustednews/2012/09/infographic-uneducated-employees-their-seven-deadly-sins

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD - nur ein Wunsch der IT-Freaks

BYOD - nur ein Wunsch der IT-Freaks | 21st Century Learning and Teaching | Scoop.it

Bring-Your-Own-Device (BYOD) bedeutet, dass der Zugriff auf die Unternehmensdaten und -Programme mittels der eigenen mobilen Endgeräten, also Smartphones und Tablets, erfolgt. Glaubt man Marktforschern, ist BYOD äußerst trendy – aber offensichtlich nur bei einer sehr kleinen Mitarbeitergruppe.

 

Mehr erfahren:

http://blog.chip.de/business-blog/2012/09/05/byod-nur-ein-wunsch-der-it-freaks/

 

No comment yet.