21st Century Learning and Teaching
586.1K views | +6 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'BYOD-Dangers'. Clear
Scooped by Gust MEES
Scoop.it!

5 Essential Insights About Mobile Learning

5 Essential Insights About Mobile Learning | 21st Century Learning and Teaching | Scoop.it
As mobile learning becomes more common, district leaders are working hard to juggle nimble adaptation in a changing environment and the desire to get it right.


Learn more:



Gust MEES's insight:

Learn more:



No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Bring Your Own Risk (BYOR) [INFOGRAPHIC]

BYOD:  Bring Your Own Risk (BYOR) [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
INFOGRAPHIC: Bring Your Own Risk (BYOR)
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security Think Tank: BYOD security: policy, control, containment, and management

Security Think Tank: BYOD security: policy, control, containment, and management | 21st Century Learning and Teaching | Scoop.it
With the growth of BYOD, what security measures can IT take to ensure security of enterprise data – and does MDM have a role?
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

EdTech "vs." IT

EdTech "vs." IT | 21st Century Learning and Teaching | Scoop.it

Unfortunately, the "EdTech vs. IT" mindset is all too prevalent in many organizations.  Operational IT looks down disdainfully on their users from an ivory tower, viewing them as "threats" to be carefully controlled and monitored. 

 

Teachers view the IT department as a bunch of out of touch control freaks who hinder rather than facilitate their work. As a former teacher, I have seen it from both sides.

This sad situation is wrong on many levels. 

 

===> The relationship between IT and users should be a partnership, not a boxing match! <===

 

Gust MEES's insight:

 

===> The relationship between IT and users should be a partnership, not a boxing match! <===

 

Make IT-Admin's life easier (and the relationship with...) by Learning and Teaching the basics of Cyber-Security, check below!

 

Learn more:

 

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=BYOD

 

Education and Security:

 

https://gustmees.wordpress.com/2013/04/22/i-got-interviewed-feeling-honored/

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

A Glimpse At The BYOD Device Of The Future [Infographic]

A Glimpse At The BYOD Device Of The Future [Infographic] | 21st Century Learning and Teaching | Scoop.it
BYOD has changed how the barriers of tech adoption are seen. First and foremost, they're now visible (the barriers). Many schools and districts are finding…
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

Verify the security of your mobile apps

Verify the security of your mobile apps | 21st Century Learning and Teaching | Scoop.it
The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018.

 

 

 

 

 

 

 

As developers create apps to run on multiple platforms and plug into existing ERPsystems, vulnerabilities grow. From insecure data storage to improper session handling, from side channel data leakage to weak server-side controls, there are many risks to consider and robust penetration testing is an absolute must. 



Via Frederic GOUTH
Gust MEES's insight:

 

As developers create apps to run on multiple platforms and plug into existing ERPsystems, vulnerabilities grow. From insecure data storage to improper session handling, from side channel data leakage to weak server-side controls, there are many risks to consider and robust penetration testing is an absolute must. 


Check also:


http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Mobile-Security


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


No comment yet.
Scooped by Gust MEES
Scoop.it!

U.K. data watchdog warns on BYOD risks

U.K. data watchdog warns on BYOD risks | 21st Century Learning and Teaching | Scoop.it
Bringing your own device to work may be beneficial to the worker, but what about when personal citizen data gets loaded on to such devices? British authorities are firing off the warning flares.

 

The ICO this week published its latest guidance note [PDF] on some of the risks that employers face when allowing personal devices into the enterprise. While BYOD is on the rise in the U.K., employers must still remember that the Data Protection Act—which stems from a 1995 European directive—still applies to these devices.

 

Gust MEES's insight:

 

The ICO this week published its latest guidance note [PDF] on some of the risks that employers face when allowing personal devices into the enterprise. While BYOD is on the rise in the U.K., employers must still remember that the Data Protection Act—which stems from a 1995 European directive—still applies to these devices.

 

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://www.ico.gov.uk/news/latest_news/2013/~/media/documents/library/Data_Protection/Practical_application/ico_bring_your_own_device_byod_guidance.ashx

 

Mike Hodges Eirias's curator insight, May 8, 2013 3:56 AM

So you don't have to be a big business to be affected by the DPA!

Scooped by Gust MEES
Scoop.it!

BYOD: Dr. Jekyll Or Mr. Hyde? - Forbes

BYOD: Dr. Jekyll Or Mr. Hyde? - Forbes | 21st Century Learning and Teaching | Scoop.it
Is BYOD a blessing or a curse?, asks Emma Byrne (@SciWriBy) Enthusiasts of the Bring Your Own Device (BYOD) trend are quick to point out the benefits for tomorrow’s business. Meanwhile, detractors warn of the increased costs and security headaches.
Gust MEES's insight:

A MUST read!!!

 

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses | 21st Century Learning and Teaching | Scoop.it
People may think their shiny new smartphones and tablets are safe from hackers and malicious software, but that isn't the case, Internet security
Gust MEES's insight:

                    ===> BEWARE of the MALWARE!!! <===

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD And Security: The Biggest Threat Of All

A new survey has found rising interest in mobile device management platforms to address mobile security threats. Still, few IT professionals indicate a real deployment of the platforms.

 

The survey found that 34 percent of respondents considered mobile devices a serious threat to business, and 55 percent said they were thinking more about the security of corporate smartphones and tablets than they did last year.

Despite the attention given to mobile malware and attacks targeting device owners, the biggest threat to enterprises are lost and stolen devices, according to most security experts.

 

===> The survey found that 10 percent of respondents experienced data leaks following the loss or theft of mobile devices. <===

 

Gust MEES's insight:

A MUST read!

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Learning basics of Cyber-Security: What You Need to Know About Mobile Security

Learning basics of Cyber-Security: What You Need to Know About Mobile Security | 21st Century Learning and Teaching | Scoop.it

Mobile Device Security: What Senior Managers Should Know


Next-generation mobile devices like iPads and Android phones can do wonders for mobile workers and drive productivity and innovation in business. However, new devices bring increased cost of administration, risk of data loss and reputation damage if they aren’t managed correctly.

 

This article provides clear, practical guidance on how you can make sure mobile ===> devices are a benefit rather than a risk for your organization. <===

 

Read more, a MUST:

http://www.sophos.com/en-us/security-news-trends/security-hubs/mobile-security/mobile-security-101.aspx

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

MDM and BYOD: A square peg for a round hole

MDM and BYOD: A square peg for a round hole | 21st Century Learning and Teaching | Scoop.it
While mobile device management will always be in use in the enterprise, thankfully, a better option exists.

 

In fact, it seems the only group not excited about BYOD is IT – the ones who have to figure out how to keep sensitive corporate information safe. IT's consternation over BYOD is made worse by the fact that many think mobile device management (MDM) is the only tool available to contain the risks associated with BYOD, which is not the case.

 

MDM will always have a place in the enterprise because BYOD will simply never be the right approach for every employee. However, when it comes to BYOD implementations, MDM is not ideal. Thankfully, a better option exists. Mobile application management (MAM) presents an intriguing option for preparing for and avoiding the hazards of BYOD.

 

Read more, a MUST:

http://www.scmarketscope.com/mdm-and-byod-a-square-peg-for-a-round-hole/article/260623/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

The BYOD security commandments

The BYOD security commandments | 21st Century Learning and Teaching | Scoop.it

The BYOD trend will make cyber security more complex

Of the tips put forward by IDC, the first one is perhaps the most obvious and perhaps the reasons why the BYOD trend has caused so many headaches.

 

“The consensus is that BYOD is now a given. Whether you want it or not, employees will do your work on their own devices,” says Infosec commentator Stilgherrian.

 

“So your choice is whether to have a policy that acknowledges that and lays out the ground rules, or try to ban it and end up with an infestation of unknown and uncontrolled devices.”

 

However, as many enterprises are currently finding out, controlling and securing data on multiple devices is a lot easier said than done.

 

Read more, a MUST:

http://technologyspectator.com.au/byod-security-commandments

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Byod : un risque et une opportunité en même temps

Byod : un risque et une opportunité en même temps | 21st Century Learning and Teaching | Scoop.it
De plus en plus d’employés emmènent leurs appareils au travail et se connectent sur le réseau de l’entreprise.
Gust MEES's insight:

 

Learn more:

 

https://www.cases.lu/fr/byod-un-risque-et-une-opportunite-en-meme-temps.html

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How do cyber criminals get your data? What do they do with it?

How do cyber criminals get your data? What do they do with it? | 21st Century Learning and Teaching | Scoop.it

By now, most everyone has heard the story: on April 23rd, the AP’s twitter account was “hacked.” The tweet, which was a fairly obviously fake, still managed to send Wall Street into a panic. The Dow Jones Industrial Average dropped 145 points in 2 minutes.


So why is this important? It highlights the reality of the threat landscape.


The point of the story is that mobile security isn’t just about protecting you from viruses. Threats don’t only come in the form of malicious applications that one inadvertently “sideloads” onto his or her device. Mobile security is also about making sure your data is protected.

 

It doesn’t matter whether the economic climate is good or bad, there is always a market for fraud. The marketplace for carding is growing and will continue to grow. And as the engineers behind these types of attacks get smarter and smarter, we can only expect to see them more and more often.






Gust MEES's insight:

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

Gust MEES's curator insight, May 14, 2013 5:11 PM

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

asma jmari 's comment, May 15, 2013 7:44 AM
thank you Gust MEES I'll check it out
asma jmari 's comment, May 20, 2013 6:34 AM
believe it or not they do and hacking is more like a hobby some do it for fun and some just dedicate themselves to it and make it a job
Scooped by Gust MEES
Scoop.it!

Infographic: The High Cost of BYOD

Infographic: The High Cost of BYOD | 21st Century Learning and Teaching | Scoop.it
Businesses today are embracing BYOD- 75% of businesses let employees use their own devices to access the network. What threats are lurking behind this mobile revolution?
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet?q=BYOD

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Infographic: The High Cost of BYOD | Trustwave

Infographic: The High Cost of BYOD | Trustwave | 21st Century Learning and Teaching | Scoop.it
Businesses today are embracing BYOD- 75% of businesses let employees use their own devices to access the network. What threats are lurking behind this mobile revolution?
Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=BYOD

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

4 Big Concerns About BYOD In Schools

4 Big Concerns About BYOD In Schools | 21st Century Learning and Teaching | Scoop.it
There are a few snags that can get in the way of implementing BYOD in schools and are worth knowing about before setting out on a BYOD path.

 

   

 

 

 

1. Security

2. Safety

3. Affordability

4. Networking and Compatibility

 

Gust MEES's insight:

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Mobility making it easier for insiders to take IP [Infographic]

BYOD: Mobility making it easier for insiders to take IP [Infographic] | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.
Gust MEES's insight:

 

Check it out and find other related infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Don't you just love mobile apps? So do malicious code writers

Don't you just love mobile apps? So do malicious code writers | 21st Century Learning and Teaching | Scoop.it
There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.

 

By now you've read about malicious apps that leak privacy data, but do you realize how serious it really is? If not, you'd better pay attention to the following statistics gathered by Symantec*. And if you think that Google Play is 100% safe, it isn't. I have some data that yields some shocking results about the number of malicious apps waiting to grab your data.


===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===


Gust MEES's insight:

 

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Gust MEES's curator insight, March 4, 2013 11:06 AM

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

alistairm 's curator insight, March 5, 2013 3:35 AM

Oh dear - the world of technology seems to be one step forward two steps back but these issues are important especially of we are going to be using mobile devices in education and promoting BYOD approaches.

alistairm 's comment, March 19, 2013 4:39 AM
Thanks all
Scooped by Gust MEES
Scoop.it!

BYOD and the Consumerization of IT

BYOD and the Consumerization of IT | 21st Century Learning and Teaching | Scoop.it
The Bring Your Own Device phenomenon is reshaping the way IT is purchased, managed, delivered, and secured. Our editors and analysts will delve into what it means, the key products involved, how to handle it, and where it’s going in the future.
Gust MEES's insight:

Lots of videos from THE experts, a MUST check out!!!

 

Check also:

 

https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Before Adopting BYOD Policies, Schools Need to Do Homework | Education News

Before Adopting BYOD Policies, Schools Need to Do Homework | Education News | 21st Century Learning and Teaching | Scoop.it
Bring Your Own Device policies could be a good way for schools to digitalize the teaching environment without breaking the bank.

 

Yet, before opening up their networks to devices students bring from home, it is important that schools take steps to ensure ===>  that it’s done safely and effectively. <===


Jonathan P. Costa, Sr. – writing for EDTECH – details what the schools need to do to accomplish that goal.

Gust MEES's insight:

A MUST read!

 

Check also:

 

- - https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | 21st Century Learning and Teaching | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Scooped by Gust MEES
Scoop.it!

5 Things To Know About The BYOD Trend [Infographic]

5 Things To Know About The BYOD Trend [Infographic] | 21st Century Learning and Teaching | Scoop.it

The Bring-Your-Own-Device trend makes sense. It’s cost-effective and lets students use the device they already know and love. While it may present some problems for your school or district’s IT department, it’s a great start to bringing in web 2.0 tools and apps to the classroom.

 

BYOD is getting adopted at a rapid clip these days. But thanks to a new infographic, we have a closer look at the BYOD trend. Entarasys outlines 5 key facts (on the left side of the infographic, the right side is more business-y) that teachers, students, and school administrators should know about.

 

Read more, a MUST:

http://edudemic.com/2012/10/5-things-to-know-about-the-byod-trend/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD (Bring Your Own Device) School Policy

BYOD (Bring Your Own Device) School Policy | 21st Century Learning and Teaching | Scoop.it
Does your child bring a handheld device to school to access the Internet?

 

Read more:

http://info.uknowkids.com/blog/bid/234136/BYOD-Bring-Your-Own-Device-School-Policy

 

Erica Cruz's curator insight, October 20, 2015 2:45 PM

This article made me think about what are my school policies and guideline for safe use of a mobile device at school.