21st Century Learning and Teaching
586.8K views | +16 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'cyberhygiene', 'eSkills'. Clear
Scooped by Gust MEES
Scoop.it!

Good cyber hygiene habits to help stay safe online | Norton | #CyberSecurity #DigitalResponsibility #DigitalCitiZENship

Good cyber hygiene habits to help stay safe online | Norton | #CyberSecurity #DigitalResponsibility #DigitalCitiZENship | 21st Century Learning and Teaching | Scoop.it

Have you heard of something called cyber hygiene? Surely, brushing your teeth and taking showers isn’t something traditionally associated with technology — yet the term is a useful metaphor for needing to make smart decisions about your smart devices.

Good hygiene is something you’re taught as a child and something that generally sticks with you for the rest of your life. It involves three basic principles: using products and tools that fit your hygiene needs, performing these hygienic tasks correctly, and establishing a routine.

But what is cyber hygiene and what does it have to do with your computer and connected devices?

Cyber hygiene is about training yourself to think proactively about your cyber security — as you do with your daily personal hygiene — to resist cyber threats and online security issues. Unfortunately, cyber security still isn’t taken as seriously as cavities and root canals. Some people take cyber security for granted, but this may change, as cyber threats continue to evolve. In the meantime, establishing solid cyber hygiene practices should be as routine as brushing your teeth.

Here are a few tips to get you and your family thinking about good cyber hygiene practices.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cyberhygiene

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Cyber-Hygiene

 

Gust MEES's insight:

Have you heard of something called cyber hygiene? Surely, brushing your teeth and taking showers isn’t something traditionally associated with technology — yet the term is a useful metaphor for needing to make smart decisions about your smart devices.

Good hygiene is something you’re taught as a child and something that generally sticks with you for the rest of your life. It involves three basic principles: using products and tools that fit your hygiene needs, performing these hygienic tasks correctly, and establishing a routine.

But what is cyber hygiene and what does it have to do with your computer and connected devices?

Cyber hygiene is about training yourself to think proactively about your cyber security — as you do with your daily personal hygiene — to resist cyber threats and online security issues. Unfortunately, cyber security still isn’t taken as seriously as cavities and root canals. Some people take cyber security for granted, but this may change, as cyber threats continue to evolve. In the meantime, establishing solid cyber hygiene practices should be as routine as brushing your teeth.

Here are a few tips to get you and your family thinking about good cyber hygiene practices.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cyberhygiene

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Cyber-Hygiene

 

Scooped by Gust MEES
Scoop.it!

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To | 21st Century Learning and Teaching | Scoop.it

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To . Internet safety is the responsibility of EVERYONE! It isn't actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes... Let us call them CyberHygiene…

Gust MEES's insight:

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To . Internet safety is the responsibility of EVERYONE! It isn't actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes... Let us call them CyberHygiene…


No comment yet.
Scooped by Gust MEES
Scoop.it!

Digitale Abstinenz: "Zu viel Smartphone macht unglücklich" | Digital CitiZEN

Digitale Abstinenz: "Zu viel Smartphone macht unglücklich" | Digital CitiZEN | 21st Century Learning and Teaching | Scoop.it
Handydaten von 60.000 Nutzern zeigen: Wir beschäftigen uns bis zu drei Stunden am Tag mit dem Smartphone. Der Leiter der Studie zieht daraus bedenkliche Schlüsse - und fordert eine digitale Diät.



Gust MEES's insight:

Handydaten von 60.000 Nutzern zeigen: Wir beschäftigen uns bis zu drei Stunden am Tag mit dem Smartphone. Der Leiter der Studie zieht daraus bedenkliche Schlüsse - und fordert eine digitale Diät.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Are the Directors on-Board the Cyber Security Train? | eLeadership | eSkills | Digital CitiZEN

Are the Directors on-Board the Cyber Security Train? | eLeadership | eSkills | Digital CitiZEN | 21st Century Learning and Teaching | Scoop.it

Cyber security is no longer the sole responsibility of the technical people, or even the CIO.


Following the Target breach (where immense pressure was placed to replace most of the board members after the breach), and board members of Target and Wyndham Worldwide (hotel chain) face derivative lawsuit related to the data breaches. Recent survey reveal that nearly half (45%) of senior management acknowledge that the C-suite and senior leadership themselves are responsible for protecting their companies against cyber-attacks, and the U.S. Securities and Exchange Commission recently published a paper on the Role of the Boards of Directors in Overseeing Cyber-Risk Management, where it recommends:

Cyber-risk must be considered as part of the board’s overall risk oversight: “boards that choose to ignore, or minimize, the importance of cyber security oversight responsibility, do so at their own peril.

Boards should assess the corporation’s cyber security measures including corporate policies and annual budgets for privacy and IT security programs. And perhaps, more critically, highlights the significance of cyber-risk education for directors, ensuring that the board be at least adequately represented by members with a good understanding of information technology issues that pose risks to the company.


Learn more:


http://www.sec.gov/News/Speech/Detail/Speech/1370542057946


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/



Gust MEES's insight:

Cyber security is no longer the sole responsibility of the technical people, or even the CIO.


Following the Target breach (where immense pressure was placed to replace most of the board members after the breach), and board members of Target and Wyndham Worldwide (hotel chain) face derivative lawsuit related to the data breaches. Recent survey reveal that nearly half (45%) of senior management acknowledge that the C-suite and senior leadership themselves are responsible for protecting their companies against cyber-attacks, and the U.S. Securities and Exchange Commission recently published a paper on the Role of the Boards of Directors in Overseeing Cyber-Risk Management, where it recommends:

Cyber-risk must be considered as part of the board’s overall risk oversight: “boards that choose to ignore, or minimize, the importance of cyber security oversight responsibility, do so at their own peril.

Boards should assess the corporation’s cyber security measures including corporate policies and annual budgets for privacy and IT security programs. And perhaps, more critically, highlights the significance of cyber-risk education for directors, ensuring that the board be at least adequately represented by members with a good understanding of information technology issues that pose risks to the company.


Learn more:


http://www.sec.gov/News/Speech/Detail/Speech/1370542057946


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Eric Nelson's curator insight, June 9, 2015 3:03 AM

Ignore it at your own peril

Scooped by Gust MEES
Scoop.it!

Infosec industry: Time to put up or shut up

Infosec industry: Time to put up or shut up | 21st Century Learning and Teaching | Scoop.it

We need to engage with other sectors of the business and society in general so that people are better educated and aware of the scale of the threats and challenges we face. So instead of shouting in an attempt to drown out the voices of those looking to create this engagement we should be shouting words of encouragement and try to find ways to amplify their message.


If we cannot do this, then we simply should stay silent so as not to distract from or derail the message.


Learn more:


http://gustmees.wordpress.com/2014/11/04/how-can-education-help-to-lower-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=A+Parent%27s+Guide+to+Cybersecurity



Gust MEES's insight:

We need to engage with other sectors of the business and society in general so that people are better educated and aware of the scale of the threats and challenges we face. So instead of shouting in an attempt to drown out the voices of those looking to create this engagement we should be shouting words of encouragement and try to find ways to amplify their message.


If we cannot do this, then we simply should stay silent so as not to distract from or derail the message.


Learn more:


http://gustmees.wordpress.com/2014/11/04/how-can-education-help-to-lower-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=A+Parent%27s+Guide+to+Cybersecurity


No comment yet.
Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

63% des salariés laissent leur PC allumé à la fin de leur journée de travail... | Cyber Security

63% des salariés laissent leur PC allumé à la fin de leur journée de travail... | Cyber Security | 21st Century Learning and Teaching | Scoop.it
Sécurité: les pratiques des salariés divergent des consignes édictées 63% des salariés laissent leur PC allumé à la fin de leur journée de travail ou ne le verrouillent pas en quittant leur bureau.


En savoir plus :


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/



Via Frederic GOUTH
Gust MEES's insight:
Sécurité: les pratiques des salariés divergent des consignes édictées 63% des salariés laissent leur PC allumé à la fin de leur journée de travail ou ne le verrouillent pas en quittant leur bureau.


En savoir plus :


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

World Backup Day: Paragon-Backup-Software kostenlos

World Backup Day: Paragon-Backup-Software kostenlos | 21st Century Learning and Teaching | Scoop.it
Am 31. März 2016 ist der "World Backup Day". Der Tag rückt das Thema Backups und Datensicherheit in den Mittelpunkt. Mit der kostenlosen Vollversion Paragon Backup & Recovery 16 Kompakt gibt es für CHIP Nutzer keine Ausreden mehr, keine Backups zu machen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/best-freeware-software/?tag=Backup-Software

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Backup

 

Gust MEES's insight:
Am 31. März 2016 ist der "World Backup Day". Der Tag rückt das Thema Backups und Datensicherheit in den Mittelpunkt. Mit der kostenlosen Vollversion Paragon Backup & Recovery 16 Kompakt gibt es für CHIP Nutzer keine Ausreden mehr, keine Backups zu machen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/best-freeware-software/?tag=Backup-Software

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Backup

 

 

Fernando de la Cruz Naranjo Grisales's curator insight, April 2, 2016 7:06 AM
Am 31. März 2016 ist der "World Backup Day". Der Tag rückt das Thema Backups und Datensicherheit in den Mittelpunkt. Mit der kostenlosen Vollversion Paragon Backup & Recovery 16 Kompakt gibt es für CHIP Nutzer keine Ausreden mehr, keine Backups zu machen.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/best-freeware-software/?tag=Backup-Software

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Backup

 

 

Scooped by Gust MEES
Scoop.it!

One step closer to an encrypted web. Next stop: HTTPS for all | Encryption | Privacy | CyberHygiene

One step closer to an encrypted web. Next stop: HTTPS for all | Encryption | Privacy | CyberHygiene | 21st Century Learning and Teaching | Scoop.it



All major web browsers are now trusting Let's Encrypt's free security certificates, bringing a more secure and private web that much closer.








Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION


http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:

All major web browsers are now trusting Let's Encrypt's free security certificates, bringing a more secure and private web that much closer.




Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION


http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

No comment yet.
Scooped by Gust MEES
Scoop.it!

55 Prozent der Cyber-Angriffe kommen von Insidern | eSkills | ICT | CyberHygiene

55 Prozent der Cyber-Angriffe kommen von Insidern | eSkills | ICT | CyberHygiene | 21st Century Learning and Teaching | Scoop.it
Gefahr für die IT-Sicherheit von Unternehmen: Die Nachrichten sind voller Meldungen über mehr oder weniger erfolgreiche Hacker-Angriffe auf Unternehmen und Behörden. Schnell entsteht dadurch der Eindruck, dass eine Gefahr vor allem von außen droht. Das Gegenteil ist jedoch der Fall.

Cyber-Gefahr: Nur 45 Prozent der Angriffe auf Unternehmen kommen von externen Hackern.
(Quelle: IBM )„Wir sprechen viel darüber, dass Cyberattacken das Werk anonymer Profihacker sind, die mit ihrem Laptop fernab in irgendwelchen dunklen Ecken sitzen und auf eine Gelegenheit warten“, sagt der IBM-Sicherheitsexperte Gerd Rademann. „Was jedoch kaum wahrgenommen wird: Über die Hälfte der Angriffe kommen aus den eigenen Reihen oder von Dritten mit Systemzugriff – also von Insidern.“


Mehr erfahren / Learn more:


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:
Gefahr für die IT-Sicherheit von Unternehmen: Die Nachrichten sind voller Meldungen über mehr oder weniger erfolgreiche Hacker-Angriffe auf Unternehmen und Behörden. Schnell entsteht dadurch der Eindruck, dass eine Gefahr vor allem von außen droht. Das Gegenteil ist jedoch der Fall.

Cyber-Gefahr: Nur 45 Prozent der Angriffe auf Unternehmen kommen von externen Hackern.
(Quelle: IBM )„Wir sprechen viel darüber, dass Cyberattacken das Werk anonymer Profihacker sind, die mit ihrem Laptop fernab in irgendwelchen dunklen Ecken sitzen und auf eine Gelegenheit warten“, sagt der IBM-Sicherheitsexperte Gerd Rademann. „Was jedoch kaum wahrgenommen wird: Über die Hälfte der Angriffe kommen aus den eigenen Reihen oder von Dritten mit Systemzugriff – also von Insidern.“


Mehr erfahren / Learn more:


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Die meisten Angriffe erfolgen über den Browser | ICT | Digital CitiZEN | eSkills | CyberSecurity | CyberHygiene

Die meisten Angriffe erfolgen über den Browser | ICT | Digital CitiZEN | eSkills | CyberSecurity | CyberHygiene | 21st Century Learning and Teaching | Scoop.it
Rund 64 Prozent aller über das Internet durchgeführten Angriffe erfolgen über den Browser, meldet Kaspersky Lab. An zweiter Stelle steht mit 14 Prozent das bei den Anwendern nicht mehr sehr beliebte Java, gefolgt von Android mit 13 Prozent, Microsoft Office mit 5 Prozent, Flash mit 3 Prozent und dem Adobe Reader mit 1 Prozent. Die Zahlen stammen aus dem cloudbasierten Kaspersky Security Network (KSN), an dem Kunden des Unternehmens auf freiwilliger Basis teilnehmen können.


Mehr erfahren / Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmeesde.wordpress.com/2014/12/16/browser-sind-das-einfallstor-fur-malware-sind-eure-browser-up-to-date/


Gust MEES's insight:
Rund 64 Prozent aller über das Internet durchgeführten Angriffe erfolgen über den Browser, meldet Kaspersky Lab. An zweiter Stelle steht mit 14 Prozent das bei den Anwendern nicht mehr sehr beliebte Java, gefolgt von Android mit 13 Prozent, Microsoft Office mit 5 Prozent, Flash mit 3 Prozent und dem Adobe Reader mit 1 Prozent. Die Zahlen stammen aus dem cloudbasierten Kaspersky Security Network (KSN), an dem Kunden des Unternehmens auf freiwilliger Basis teilnehmen können.


Mehr erfahren / Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmeesde.wordpress.com/2014/12/16/browser-sind-das-einfallstor-fur-malware-sind-eure-browser-up-to-date/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Why Cyber Security Starts At Home

Why Cyber Security Starts At Home | 21st Century Learning and Teaching | Scoop.it
Even the grandmas on Facebook need to know and practice basic security hygiene, because what happens anywhere on the Internet can eventually affect us all.


Learn more:


http://gustmees.wordpress.com/2014/11/04/how-can-education-help-to-lower-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=A+Parent%27s+Guide+to+Cybersecurity


Gust MEES's insight:
Even the grandmas on Facebook need to know and practice basic security hygiene, because what happens anywhere on the Internet can eventually affect us all.


Learn more:


http://gustmees.wordpress.com/2014/11/04/how-can-education-help-to-lower-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=A+Parent%27s+Guide+to+Cybersecurity


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime is a business that looks for easy money | Cyber Security | eSkills

Cybercrime is a business that looks for easy money | Cyber Security | eSkills | 21st Century Learning and Teaching | Scoop.it

There are some basic steps to take to be adequately protected. The basic steps should at least include:


1.    Educate your employees of the risks and teach them how to use their devices securely


2.    Take care of encryption for all devices


3.    Keep all software – AV, operating system, and third party software - up to date


 
Following these steps, you and your company should at least be a much more difficult target to hit.


Learn more:


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:

There are some basic steps to take to be adequately protected. The basic steps should at least include:


1.    Educate your employees of the risks and teach them how to use their devices securely


2.    Take care of encryption for all devices


3.    Keep all software – AV, operating system, and third party software - up to date


 
Following these steps, you and your company should at least be a much more difficult target to hit.


Learn more:


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Roger Smith's curator insight, November 8, 2014 3:54 AM

Just like any crime it is always perpetrated on the unprepared.