21st Century Learning and Teaching
586.3K views | +9 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Education 3.0', 'cyberhygiene'. Clear
Scooped by Gust MEES
Scoop.it!

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To | 21st Century Learning and Teaching | Scoop.it

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To . Internet safety is the responsibility of EVERYONE! It isn't actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes... Let us call them CyberHygiene…

Gust MEES's insight:

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To . Internet safety is the responsibility of EVERYONE! It isn't actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes... Let us call them CyberHygiene…


No comment yet.
Scooped by Gust MEES
Scoop.it!

55 Prozent der Cyber-Angriffe kommen von Insidern | eSkills | ICT | CyberHygiene

55 Prozent der Cyber-Angriffe kommen von Insidern | eSkills | ICT | CyberHygiene | 21st Century Learning and Teaching | Scoop.it
Gefahr für die IT-Sicherheit von Unternehmen: Die Nachrichten sind voller Meldungen über mehr oder weniger erfolgreiche Hacker-Angriffe auf Unternehmen und Behörden. Schnell entsteht dadurch der Eindruck, dass eine Gefahr vor allem von außen droht. Das Gegenteil ist jedoch der Fall.

Cyber-Gefahr: Nur 45 Prozent der Angriffe auf Unternehmen kommen von externen Hackern.
(Quelle: IBM )„Wir sprechen viel darüber, dass Cyberattacken das Werk anonymer Profihacker sind, die mit ihrem Laptop fernab in irgendwelchen dunklen Ecken sitzen und auf eine Gelegenheit warten“, sagt der IBM-Sicherheitsexperte Gerd Rademann. „Was jedoch kaum wahrgenommen wird: Über die Hälfte der Angriffe kommen aus den eigenen Reihen oder von Dritten mit Systemzugriff – also von Insidern.“


Mehr erfahren / Learn more:


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:
Gefahr für die IT-Sicherheit von Unternehmen: Die Nachrichten sind voller Meldungen über mehr oder weniger erfolgreiche Hacker-Angriffe auf Unternehmen und Behörden. Schnell entsteht dadurch der Eindruck, dass eine Gefahr vor allem von außen droht. Das Gegenteil ist jedoch der Fall.

Cyber-Gefahr: Nur 45 Prozent der Angriffe auf Unternehmen kommen von externen Hackern.
(Quelle: IBM )„Wir sprechen viel darüber, dass Cyberattacken das Werk anonymer Profihacker sind, die mit ihrem Laptop fernab in irgendwelchen dunklen Ecken sitzen und auf eine Gelegenheit warten“, sagt der IBM-Sicherheitsexperte Gerd Rademann. „Was jedoch kaum wahrgenommen wird: Über die Hälfte der Angriffe kommen aus den eigenen Reihen oder von Dritten mit Systemzugriff – also von Insidern.“


Mehr erfahren / Learn more:


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Die meisten Angriffe erfolgen über den Browser | ICT | Digital CitiZEN | eSkills | CyberSecurity | CyberHygiene

Die meisten Angriffe erfolgen über den Browser | ICT | Digital CitiZEN | eSkills | CyberSecurity | CyberHygiene | 21st Century Learning and Teaching | Scoop.it
Rund 64 Prozent aller über das Internet durchgeführten Angriffe erfolgen über den Browser, meldet Kaspersky Lab. An zweiter Stelle steht mit 14 Prozent das bei den Anwendern nicht mehr sehr beliebte Java, gefolgt von Android mit 13 Prozent, Microsoft Office mit 5 Prozent, Flash mit 3 Prozent und dem Adobe Reader mit 1 Prozent. Die Zahlen stammen aus dem cloudbasierten Kaspersky Security Network (KSN), an dem Kunden des Unternehmens auf freiwilliger Basis teilnehmen können.


Mehr erfahren / Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmeesde.wordpress.com/2014/12/16/browser-sind-das-einfallstor-fur-malware-sind-eure-browser-up-to-date/


Gust MEES's insight:
Rund 64 Prozent aller über das Internet durchgeführten Angriffe erfolgen über den Browser, meldet Kaspersky Lab. An zweiter Stelle steht mit 14 Prozent das bei den Anwendern nicht mehr sehr beliebte Java, gefolgt von Android mit 13 Prozent, Microsoft Office mit 5 Prozent, Flash mit 3 Prozent und dem Adobe Reader mit 1 Prozent. Die Zahlen stammen aus dem cloudbasierten Kaspersky Security Network (KSN), an dem Kunden des Unternehmens auf freiwilliger Basis teilnehmen können.


Mehr erfahren / Learn more:


https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/


https://gustmeesde.wordpress.com/2014/12/16/browser-sind-das-einfallstor-fur-malware-sind-eure-browser-up-to-date/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Why Cyber Security Starts At Home

Why Cyber Security Starts At Home | 21st Century Learning and Teaching | Scoop.it
Even the grandmas on Facebook need to know and practice basic security hygiene, because what happens anywhere on the Internet can eventually affect us all.


Learn more:


http://gustmees.wordpress.com/2014/11/04/how-can-education-help-to-lower-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=A+Parent%27s+Guide+to+Cybersecurity


Gust MEES's insight:
Even the grandmas on Facebook need to know and practice basic security hygiene, because what happens anywhere on the Internet can eventually affect us all.


Learn more:


http://gustmees.wordpress.com/2014/11/04/how-can-education-help-to-lower-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=A+Parent%27s+Guide+to+Cybersecurity


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybercrime is a business that looks for easy money | Cyber Security | eSkills

Cybercrime is a business that looks for easy money | Cyber Security | eSkills | 21st Century Learning and Teaching | Scoop.it

There are some basic steps to take to be adequately protected. The basic steps should at least include:


1.    Educate your employees of the risks and teach them how to use their devices securely


2.    Take care of encryption for all devices


3.    Keep all software – AV, operating system, and third party software - up to date


 
Following these steps, you and your company should at least be a much more difficult target to hit.


Learn more:


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:

There are some basic steps to take to be adequately protected. The basic steps should at least include:


1.    Educate your employees of the risks and teach them how to use their devices securely


2.    Take care of encryption for all devices


3.    Keep all software – AV, operating system, and third party software - up to date


 
Following these steps, you and your company should at least be a much more difficult target to hit.


Learn more:


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Roger Smith's curator insight, November 8, 2014 3:54 AM

Just like any crime it is always perpetrated on the unprepared.

Scooped by Gust MEES
Scoop.it!

CIRCL: Devices Lost? Stolen? Seized?

CIRCL: Devices Lost? Stolen? Seized? | 21st Century Learning and Teaching | Scoop.it

CIRCL: Devices Lost? Stolen? Seized? A GREAT guide, follow the advice!


Gust MEES's insight:

#CIRCL: Devices Lost? Stolen? Seized? A GREAT guide, follow the advice! 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How to Save the Net: A CDC for Cybercrime | CyberHygiene | Digital Citizen

How to Save the Net: A CDC for Cybercrime | CyberHygiene | Digital Citizen | 21st Century Learning and Teaching | Scoop.it
Forming an agency whose core mission is cybersecurity research and information sharing would help change the nature of the game.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:
Forming an agency whose core mission is cybersecurity research and information sharing would help change the nature of the game.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Mega-Datenklau: Hacker nutzen 1,2 Milliarden Logins aus | Passwords

Mega-Datenklau: Hacker nutzen 1,2 Milliarden Logins aus | Passwords | 21st Century Learning and Teaching | Scoop.it
Im August hatte die Hacker-Bande CyberVor den größten Passwort-Diebstahl in der Geschichte verübt und 1,2 Milliarden Login-Daten geklaut. Nun werden die Login-Daten aktiv ausgenutzt.


Namecheap blockiert derzeit die IP-Adressen der Angriffe und hat die Strafverfolgungsbehörden eingeschaltet.


===> Zur Sicherheit sollten alle User ihre Kennwörter ändern - falls noch nicht geschehen.  <===


Gust MEES's insight:

===> Zur Sicherheit sollten alle User ihre Kennwörter ändern - falls noch nicht geschehen.  <===


No comment yet.
Scooped by Gust MEES
Scoop.it!

USB Hygiene

USB Hygiene | 21st Century Learning and Teaching | Scoop.it
By this point you should be fairly well aware of the threats facing you when browsing the Internet on your digital devices. From phishing scams in your inbox to malicious banner links, surfing the ...
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://www.scoop.it/t/ict-security-tools/?tag=USB

 

http://www.scoop.it/t/ict-security-tools/?tag=USB-Security

 

http://gustmees.wordpress.com/2012/05/17/ideas-for-a-more-secure-internet-part3dangers-of-storage-devices/

 

Scooped by Gust MEES
Scoop.it!

How to hack a nation's infrastructure

How to hack a nation's infrastructure | 21st Century Learning and Teaching | Scoop.it
Governments are scrambling to shore up the defences of critical infrastructure systems as the web exposes them to greater scrutiny.

 

"For attackers, the potential pay-off for compromising these systems is very high," said Mr Wilhoit.

 

Governments are turning their attention to increasingly public vulnerabilities in such critical systems.

 

The US Department of Homeland Security has established a computer emergency response team that deals solely with threats to industrial control systems.

 

In the UK, government cash has been made available to help intelligence agencies and law enforcement deal with cyberthreats.

 

Continue reading the main story 

A Cabinet Office spokesman said cyber-attacks were one of the "top four" threats to the UK's national security.

 

"Billions of pounds are being lost to the UK economy from cybercrime each year, including from intellectual property theft and cyber-espionage," he said. "Industry is by far the biggest victim."

Gust MEES's insight:

 

"The threat is there," he said, "It might not be biting you yet but you had better be ready for the day it does."


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's curator insight, May 20, 2013 6:35 AM

 

"The threat is there," he said, "It might not be biting you yet but you had better be ready for the day it does."

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattacks

 

 

Scooped by Gust MEES
Scoop.it!

Mobile Anwender sind ein Sicherheitsrisiko | ICT | BYOD | eSkills | CyberSecurity

Mobile Anwender sind ein Sicherheitsrisiko | ICT | BYOD | eSkills | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
Der sorglose Umgang der Mitarbeiter mit mobiler Technologie gehört laut IDC neben Malware und Phishing-Attacken zu den häufigsten Risiken beim Thema Mobile Security in Unternehmen.


Zu den größten Sicherheitsrisiken aus Sicht der IT-Verantwortlichen zählen dabei Mobile Malware mit 42 Prozent, gefolgt von Phishing und Social Engineering mit 35 Prozent. Weitere 30 Prozent gaben an, dass das Fehlverhalten von Anwendern – vorsätzlich oder unabsichtlich – ein großes Risiko darstelle. Sie planen deshalb, die Mitarbeiter stärker für das Thema Mobile Security zu sensibilisieren. 
Dies soll vor allem durch Trainings der Anwender und IT-Mitarbeiter sowie Richtlinien zur sicheren Nutzung mobiler Endgeräte geschehen - wobei hier die Wünsche der IT-Verantwortlichen und der User teils sehr unterschiedlich sind.
.
Learn more / Mehr erfahren:
.
.
Gust MEES's insight:
Der sorglose Umgang der Mitarbeiter mit mobiler Technologie gehört laut IDC neben Malware und Phishing-Attacken zu den häufigsten Risiken beim Thema Mobile Security in Unternehmen.


Zu den größten Sicherheitsrisiken aus Sicht der IT-Verantwortlichen zählen dabei Mobile Malware mit 42 Prozent, gefolgt von Phishing und Social Engineering mit 35 Prozent. Weitere 30 Prozent gaben an, dass das Fehlverhalten von Anwendern – vorsätzlich oder unabsichtlich – ein großes Risiko darstelle. Sie planen deshalb, die Mitarbeiter stärker für das Thema Mobile Security zu sensibilisieren. 
Dies soll vor allem durch Trainings der Anwender und IT-Mitarbeiter sowie Richtlinien zur sicheren Nutzung mobiler Endgeräte geschehen - wobei hier die Wünsche der IT-Verantwortlichen und der User teils sehr unterschiedlich sind.
Learn more / Mehr erfahren:
No comment yet.
Scooped by Gust MEES
Scoop.it!

Are the Directors on-Board the Cyber Security Train? | eLeadership | eSkills | Digital CitiZEN

Are the Directors on-Board the Cyber Security Train? | eLeadership | eSkills | Digital CitiZEN | 21st Century Learning and Teaching | Scoop.it

Cyber security is no longer the sole responsibility of the technical people, or even the CIO.


Following the Target breach (where immense pressure was placed to replace most of the board members after the breach), and board members of Target and Wyndham Worldwide (hotel chain) face derivative lawsuit related to the data breaches. Recent survey reveal that nearly half (45%) of senior management acknowledge that the C-suite and senior leadership themselves are responsible for protecting their companies against cyber-attacks, and the U.S. Securities and Exchange Commission recently published a paper on the Role of the Boards of Directors in Overseeing Cyber-Risk Management, where it recommends:

Cyber-risk must be considered as part of the board’s overall risk oversight: “boards that choose to ignore, or minimize, the importance of cyber security oversight responsibility, do so at their own peril.

Boards should assess the corporation’s cyber security measures including corporate policies and annual budgets for privacy and IT security programs. And perhaps, more critically, highlights the significance of cyber-risk education for directors, ensuring that the board be at least adequately represented by members with a good understanding of information technology issues that pose risks to the company.


Learn more:


http://www.sec.gov/News/Speech/Detail/Speech/1370542057946


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/



Gust MEES's insight:

Cyber security is no longer the sole responsibility of the technical people, or even the CIO.


Following the Target breach (where immense pressure was placed to replace most of the board members after the breach), and board members of Target and Wyndham Worldwide (hotel chain) face derivative lawsuit related to the data breaches. Recent survey reveal that nearly half (45%) of senior management acknowledge that the C-suite and senior leadership themselves are responsible for protecting their companies against cyber-attacks, and the U.S. Securities and Exchange Commission recently published a paper on the Role of the Boards of Directors in Overseeing Cyber-Risk Management, where it recommends:

Cyber-risk must be considered as part of the board’s overall risk oversight: “boards that choose to ignore, or minimize, the importance of cyber security oversight responsibility, do so at their own peril.

Boards should assess the corporation’s cyber security measures including corporate policies and annual budgets for privacy and IT security programs. And perhaps, more critically, highlights the significance of cyber-risk education for directors, ensuring that the board be at least adequately represented by members with a good understanding of information technology issues that pose risks to the company.


Learn more:


http://www.sec.gov/News/Speech/Detail/Speech/1370542057946


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Eric Nelson's curator insight, June 9, 2015 3:03 AM

Ignore it at your own peril

Scooped by Gust MEES
Scoop.it!

Infosec industry: Time to put up or shut up

Infosec industry: Time to put up or shut up | 21st Century Learning and Teaching | Scoop.it

We need to engage with other sectors of the business and society in general so that people are better educated and aware of the scale of the threats and challenges we face. So instead of shouting in an attempt to drown out the voices of those looking to create this engagement we should be shouting words of encouragement and try to find ways to amplify their message.


If we cannot do this, then we simply should stay silent so as not to distract from or derail the message.


Learn more:


http://gustmees.wordpress.com/2014/11/04/how-can-education-help-to-lower-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=A+Parent%27s+Guide+to+Cybersecurity



Gust MEES's insight:

We need to engage with other sectors of the business and society in general so that people are better educated and aware of the scale of the threats and challenges we face. So instead of shouting in an attempt to drown out the voices of those looking to create this engagement we should be shouting words of encouragement and try to find ways to amplify their message.


If we cannot do this, then we simply should stay silent so as not to distract from or derail the message.


Learn more:


http://gustmees.wordpress.com/2014/11/04/how-can-education-help-to-lower-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=A+Parent%27s+Guide+to+Cybersecurity


No comment yet.
Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

63% des salariés laissent leur PC allumé à la fin de leur journée de travail... | Cyber Security

63% des salariés laissent leur PC allumé à la fin de leur journée de travail... | Cyber Security | 21st Century Learning and Teaching | Scoop.it
Sécurité: les pratiques des salariés divergent des consignes édictées 63% des salariés laissent leur PC allumé à la fin de leur journée de travail ou ne le verrouillent pas en quittant leur bureau.


En savoir plus :


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/



Via Frederic GOUTH
Gust MEES's insight:
Sécurité: les pratiques des salariés divergent des consignes édictées 63% des salariés laissent leur PC allumé à la fin de leur journée de travail ou ne le verrouillent pas en quittant leur bureau.


En savoir plus :


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Why Cyber Security Matters To Everyone | Cyber Hygiene | Digital Citizenship

Why Cyber Security Matters To Everyone | Cyber Hygiene | Digital Citizenship | 21st Century Learning and Teaching | Scoop.it
October is National Cyber Security Awareness Month -- as good a time as any to remind people that their cyber security hygiene doesn't just affect them, but everyone around them. And in the globally connected world we live in, that literally is everyone. Your cyber hygiene affects others It's not unlike public [...]


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


Gust MEES's insight:
October is National Cyber Security Awareness Month -- as good a time as any to remind people that their cyber security hygiene doesn't just affect them, but everyone around them. And in the globally connected world we live in, that literally is everyone. Your cyber hygiene affects others It's not unlike public [...]


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


http://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers target Apple Mac OS X with 25 malware variants

Hackers target Apple Mac OS X with 25 malware variants | 21st Century Learning and Teaching | Scoop.it
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's insight:
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Gust MEES's curator insight, September 9, 2014 10:16 AM
Targeted attacks aim to steal sensitive data from Mac systems, says F-Secure


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


Scooped by Gust MEES
Scoop.it!

160,000 new malware samples appear each day | #CyberSecurity

160,000 new malware samples appear each day | #CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according to Panda Security.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:

Malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated, at an average rate of 160,000 every day, according to Panda Security.


Learn more:


http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Data breaches - over half are due to carelessness, says ICO

Data breaches - over half are due to carelessness, says ICO | 21st Century Learning and Teaching | Scoop.it
The UK Information Commissioner's Office (ICO) has announced that the majority of data breaches in the first quarter of 2013 were due to carelessness in the way that the information was handled.

 

That's according to the UK Information Commissioner's Office (ICO) which says 175 out of 335 incidents it examined between April 1 and June 30 were due to personal data being “disclosed in error”.

 

Half of data breaches are due to people being careless with what they do with private information. How can we all help to reduce this problem?

 

===> Do we need better user education? <===

 

Gust MEES's insight:

 

Half of data breaches are due to people being careless with what they do with private information. How can we all help to reduce this problem?

 

===> Do we need better user education? <===

 

YES!!!

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

Gust MEES's curator insight, August 15, 2013 11:42 AM

 

Half of data breaches are due to people being careless with what they do with private information. How can we all help to reduce this problem?

 

===> Do we need better user education? <===

 

YES!!!

 

Learn more:

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

 

Scooped by Gust MEES
Scoop.it!

How to keep your business safe – the one checklist all SMBs should have [Infographic]

How to keep your business safe – the one checklist all SMBs should have [Infographic] | 21st Century Learning and Teaching | Scoop.it
Gust MEES's insight:

 

This is ALSO for EDUCATION and watch "Point 10" ===> SCREEN EMPLOYEES THOROUGHLY! <===  Conduct thorough background and reference checks before hiring new employees!!!

 

I said already that it is VERY IMPORTANT that students have the basics of Internet-Safety and ALSO of Cyber-Security as employers need employees who have that knowledge! Prepare THEM for the REAL-WORLD!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2013/06/13/stop-theoretical-testing-and-test-for-future-skilled-and-educated-workers/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

Gust MEES's curator insight, June 24, 2013 11:04 AM

 

This is ALSO for EDUCATION and watch "Point 10" ===> SCREEN EMPLOYEES THOROUGHLY! <===  Conduct thorough background and reference checks before hiring new employees!!!

 

I said already that it is VERY IMPORTANT that students have the basics of Internet-Safety and ALSO of Cyber-Security as employers need employees who have that knowledge! Prepare THEM for the REAL-WORLD!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2013/06/23/ict-awareness-what-you-should-know/

 

http://gustmees.wordpress.com/2013/06/13/stop-theoretical-testing-and-test-for-future-skilled-and-educated-workers/

 

http://gustmees.wordpress.com/2013/06/02/social-media-students-take-care/

 

http://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic