21st Century Learning and Teaching
586.7K views | +8 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'BYOD'. Clear
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Stop Think Connect-USE SECURITY SETTINGS TO CONTROL ONLINE IDENTITY.

Stop Think Connect-USE SECURITY SETTINGS TO CONTROL ONLINE IDENTITY. | 21st Century Learning and Teaching | Scoop.it

When you cross the street, you look both ways to make sure it’s safe. Staying safe on the Internet is similar. It takes some common sense steps.

 

- STOP: Before you use the Internet, take time to understand the risks and learn how to spot potential problems.

 

- THINK: Take a moment to be certain the path ahead is clear. Watch for warning signs and consider how your actions online could impact your safety, or your family’s.

 

- CONNECT: Enjoy the Internet with greater confidence, knowing you’ve taken the right steps to safeguard yourself and your computer.

Protect yourself and help keep the web a safer place for everyone.

 

The Anti-Phishing Working Group (APWG) and National Cyber Security Alliance (NCSA) led the development of the STOP. THINK. CONNECT. campaign. The U.S. Department of Homeland Security provides the Federal Government's leadership for the STOP. THINK. CONNECT. campaign.

 

Read more and watch the videos:

http://www.stopthinkconnect.org/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

IT managers see BYOD benefits but worry about risk - survey

IT managers see BYOD benefits but worry about risk - survey | 21st Century Learning and Teaching | Scoop.it
More than 80pc of IT managers think enterprises with a bring-your-own-device (BYOD) policy have a competitive advantage over other organisations, research commissioned by BT suggests.

 

Security concerns come with BYOD
The survey shows there is a caveat to BYOD, however, and that pertains to security.

 

Thirty-nine per cent of enterprises have experienced a security breach due to employees bringing in unauthorised devices – most commonly in the fast-moving consumer goods (FMCG) and pharmaceuticals sectors, according to the survey.

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Visual IT-Security

Visual IT-Security | 21st Century Learning and Teaching | Scoop.it

For most people it is very difficult to understand IT-Security and also the need to apply it…. To me it looks sometimes like that people see a computer as a modern typewriter and/or a game console, but that’s not the case.

 

I will try to explain to you a computer in a visual manner so that you might able to understand better why there is a need to protect your computer and also why a computer is in danger to get a virus, trojan, and other malware infections.

 

Will get updated often, read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Living With the genie

Consumer-driven technology is proliferating in the workplace. From CEO to newest graduate trainee, people want to use smartphones, tablets and other new device types – and they are doing so, whethe...
No comment yet.
Suggested by Evolving Classroom
Scoop.it!

Train Your Teachers Before Deploying More iPads!

Train Your Teachers Before Deploying More iPads! | 21st Century Learning and Teaching | Scoop.it

Last week an educator asked the question, “What digital learning technology can my school district invest in that will not become obsolete?” The answer… teacher training technology! More specifically, professional development (PD) sessions that essentially deliver the knowledge, skills and competencies required for a successful transition from a 20th century schooling style to 21st century digital learning style.

 

This is the critical component for success in any school technology initiative and implementation.

 

Read more...

No comment yet.
Rescooped by Gust MEES from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Creating a Robust and Safe BYOD Program

Creating a Robust and Safe BYOD Program | 21st Century Learning and Teaching | Scoop.it

Network Security and More


Don Knezek, executive director of the International Society for Technology in Education (ISTE), notes that starting a BYOD program means making adjustments when it comes to security, especially protecting a district’s proprietary and secure data. That function, he says, used to be handled by an effective firewall that kept out unwanted users and their devices.

 

“Nowadays, you have to have a layer past the firewall that we didn’t have to deal with when we simply said no to user-owned devices,” he says. “Now all of a sudden, you have multiple points of entry at different levels of access, and that requires more diligence.”

One key to maintaining adequate security, Knezek and other experts say, is to have multiple networks: one for Wi-Fi traffic, one for district business and for other secure information for teachers and administrators only, and one for students and outside users of the district’s Web site.

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

CITE Conference to tackle BYOD issues

CITE Conference to tackle BYOD issues | 21st Century Learning and Teaching | Scoop.it

Bring-your-own-device policies are forcing companies to confront a myriad of IT challenges related to support architecture, security policies and mobile platforms. Dealing with those challenges is topic No.1

No comment yet.
Scooped by Gust MEES
Scoop.it!

Building an Effective School BYOD Plan

Schools are needing increasing amounts of expensive educational technology at a time when budgets are shrinking.

 

Building an Effective School BYOD Plan

No comment yet.
Scooped by Gust MEES
Scoop.it!

Smartphone security gap exposes location, texts, email, expert says

Smartphone security gap exposes location, texts, email, expert says | 21st Century Learning and Teaching | Scoop.it
Just as U.S. companies are coming to grips with the threats to their computer networks emanating from cyber spies based in China, a noted expert is highlighting what he says is an even more pernicious vulnerability in smartphones.
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Social Networking Security in the Workplace

Social Networking Security in the Workplace | 21st Century Learning and Teaching | Scoop.it
At any given moment today, on-the-clock employees are updating their social media status, reading feeds and networking on business media sites.

 

Remember that hackers now target mobile devices such as smartphones and tablet PCs. Businesses should specify whether employees are permitted to access social networking sites from these devices and which apps may be used to do so.

 

Once policies are established, it may be necessary to reinforce them with a carefully considered combination of network monitoring and data protection technologies. In some cases, these technologies may already be in place as part of standard IT security measures.

 

===> If so, they should be configured to include social networking controls. <===

 

Read more:

http://www.computerworld.com/s/article/9227325/Social_Networking_Security_in_the_Workplace?source=rss_security&amp;amp;utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed:+computerworld/s/feed/topic/17+(Computerworld+Security+News)

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Prepare for BYOD in your organization

Prepare for BYOD in your organization | 21st Century Learning and Teaching | Scoop.it
Jacob Bradshaw discusses a few ideas and considerations that you should chew on while building your battle plan to handle the BYOD invasion.

 

 

 

 

Here are a few questions to consider:

 

- Will there any chance that the employee can use or attempt to use your organization’s intellectual property on their device?
- Is that type of access going to be allowed? If not, how will it be blocked?
- As an employee with a new device, how much control do you want to let your organization have over it?
- As an IT admin, how much control do you need to have over that mobile device?
- How big of a security threat is that mobile device to your network, and can your current infrastructure handle that much bandwidth and overhead?
- How much security is enough from an IT standpoint, and how much is too much from a user’s standpoint?
- Once the company is managing that device, how much end-user support is going to be rendered to the user?

 

Read more...

http://www.techrepublic.com/blog/tablets/prepare-for-byod-in-your-organization/1369?tag=nl.e101

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Q&A: What BYOD means for IT

Q&A: What BYOD means for IT | 21st Century Learning and Teaching | Scoop.it
ZDNet editor in chief Larry Dignan and TechRepublic editor in chief Jason Hiner answer user questions about the BYOD phenomenon in IT.

 

Read more...

 

No comment yet.
Suggested by Jeff See
Scoop.it!

Forget BYOB, Today's Hyper-Connected World is all about BYOD ...

Forget BYOB, Today's Hyper-Connected World is all about BYOD ... | 21st Century Learning and Teaching | Scoop.it
Forget BYOB, Today's Hyper-Connected World is all about BYOD. As we mentioned in a recent post about the WEF's Cyber Resilience campaign, we entered the global partnership to help highlight the need for collaborative ...

 

IT departments are finding that the push comes from executives who are used to using their mobile devices on the road and don’t want to be denied access to work-related information while they travel, particularly when it is for business. So, in setting these types of BYOD policies, there are several things to consider:


- What types of devices will your company allow to access corporate data?


- What types of applications will be allowed, from browsing to email to the full corporate environment?


- What policies will you need to protect against lost data should a device be lost or stolen?


- What security do you currently have in place to protect corporate data on personal mobile devices? Forrester claims that only 50 percent of organizations enforce a password policy for mobile devices.


- What is acceptable use and how do you plan to enforce it?


- How do you prevent downloads of unauthorized apps or illegal downloads on a mobile device?


- What happens when someone leaves your organization?

 

Check out also the WhitePaper: 

 

http://www.scribd.com/doc/74785478/Living-With-the-genie

 

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Ten Ways to Handle Insider Threats

Ten Ways to Handle Insider Threats | 21st Century Learning and Teaching | Scoop.it

Tough economic times make it tempting for an employee to switch his white hat to a black one for financial gain. Insider threats also include contractors, auditors, and anyone who has authorized access to systems.

 

Read more, A MUST...

 


Via IS Decisions, Gust MEES
No comment yet.
Scooped by Gust MEES
Scoop.it!

Malicious software meets BYOD

Malicious software meets BYOD | 21st Century Learning and Teaching | Scoop.it
Bringing together two separate pieces of security research reveals vulnerability to cybercrime on an alarming scale.

 

When trying to get a handle on cybercrime today, consider this: In millions of homes across America, unencrypted company information is sitting on unprotected desktops and laptops – in the hands of employees who have had no security training.

 

At the same time, we see software being deployed that can stealthily and remotely scan the hard drives of those machines for specific data, and secretly transmit it back to the scanner.

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Identity: Yes, that’s your security perimeter being reinvented

Identity: Yes, that’s your security perimeter being reinvented | 21st Century Learning and Teaching | Scoop.it
Clouds, mobile devices and distributed applications are smashing traditional enterprise security boundaries and identity is poised to help redefine a...
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Android malware spreads via Facebook [VIDEO] | Naked Security

Android malware spreads via Facebook [VIDEO] | Naked Security | 21st Century Learning and Teaching | Scoop.it
Android malware! On Facebook! Caught on camera! If you're using Facebook on your Android smartphone, you should be just as careful clicking on links as you would (hopefully) be on a desktop computer.
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

IBM Adopts BYOD Trend with Open Approach, Security | SiliconANGLE

IBM Adopts BYOD Trend with Open Approach, Security | SiliconANGLE | 21st Century Learning and Teaching | Scoop.it

Bodin said there’s no automatic app discovery or tracking software to detect if a user is downloading apps that could be seen as objectionable by managers. IBM, however, has long had in place “very aggressive” business conduct guidelines that should govern the behaviors and personal decisions of users when picking apps.

 

IBM requires every staffer to sign these business conduct guidelines, but this new policy does provide some room for employees to slack off. Interestingly enough, this has been proven to actually increase productivity by a couple of students at the Academy of Management in Texas.

No comment yet.