21st Century Learning and Teaching
586.7K views | +10 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'Government'. Clear
Scooped by Gust MEES
Scoop.it!

47 Reasons to Thank a SysAdmin Today

47 Reasons to Thank a SysAdmin Today | 21st Century Learning and Teaching | Scoop.it
Happy SysAdmins Day! Here's a post dedicated to all the hard work SysAdmins do for organizations around the globe.

 

Gust MEES: think on these persons who make your e-Learning available through secure Internet connexion and who are taking care of IT-Security in your Local Network, you need them ;)

 

Read more about their big responsibilities:

http://www.gfi.com/blog/47-reasons-to-thank-a-sysadmin-today/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

For BYOD Best Practices, Secure Data, Not Devices

For BYOD Best Practices, Secure Data, Not Devices | 21st Century Learning and Teaching | Scoop.it

IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem. But a number of mobile security vendors believe organizations are focusing the device when they should be focusing on the data.

 

Gust MEES: check out also my blog about "BYOD" here http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more, very interesting...:

http://trap.it/KpeRhS

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Dropbox Security Breach: Who's Guarding Your Secrets In The Cloud?

Dropbox Security Breach: Who's Guarding Your Secrets In The Cloud? | 21st Century Learning and Teaching | Scoop.it
Drew Houston of Dropbox speaks during the Digital Life Design conference (DLD) at HVB Forum on January 23, 2012 in Munich, Germany. Dropbox is investigating whether its security was breached, leading to spam messages to users.

 

Cloud services are the ballyhooed future of software, information storage, device management and whatever else you can think of that requires the use of a computer or device. Which is why Dropbox’s current investigation into itself gives pause. The preeminent cloud-company is checking to see whether its security has been breached, leading to a rash of spam emails sent to users.

 

If such hack-attacks are not subdued when aimed at massive central information-storage servers, can the cloud be trusted?

 

Read more:

http://www.forbes.com/sites/karstenstrauss/2012/07/19/dropbox-security-breach-security-in-the-cloud/?ss=cio-network

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Online identity theft up 200% since 2010

Online identity theft up 200% since 2010 | 21st Century Learning and Teaching | Scoop.it
Summary: Following the recent slew of attacks against various websites that resulted in millions of user accounts being compromised, comes this little statistic: fraudsters traded 12 million pieces of personal information online in just Q1 2012.

 

 

 

 

Read more:

http://www.zdnet.com/online-identity-theft-up-200-since-2010-7000001170/

 

Tom George's comment, July 19, 2012 6:32 AM
Hey Gust Mees,
Not sure if I asked you, but you are more then welcome to share your curation to Internet Billboards, many extra advantages. Hope you have a great day.
Scooped by Gust MEES
Scoop.it!

BYOD Security Becomes a Pervasive Issue

BYOD Security Becomes a Pervasive Issue | 21st Century Learning and Teaching | Scoop.it
There's a lot of interest in all things related to the bring your own device (BYOD) phenomenom, especially as it relates to figuring out just how big an opportunity this movement might be for the channel.

 

Gust MEES: check out also http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

 

Read more, a MUST:

http://www.channelinsider.com/c/a/News/BYOD-Security-Becomes-a-Pervasive-Issue-881958/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Symantec Empowers Enterprises to Embrace Mobility, BYOD

Symantec Empowers Enterprises to Embrace Mobility, BYOD | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

 

 

 

However, IT departments tasked with keeping company networks and sensitive data safe are still struggling to get a handle on mobility. According to the same survey, mobility ranks as the leading IT risk among organizations, that includes being perceived as more risky than virtualization and even public cloud computing.

 

===> Device loss, data breach and mobile malware are some of the chief concerns. And these concerns are not unfounded. For the 12 month period leading up to the survey, the average cost of enterprise losses associated with mobility was $429,000. <===

 

To help enterprises take full advantage of mobility while also mitigating the very real risks associated with it, Symantec has built the strongest mobile security and management product portfolio available. Today, we announced significant updates to this portfolio that enhance our already industry-leading capabilities in mobile device management, mobile application management and mobile threat protection.

No comment yet.
Scooped by Gust MEES
Scoop.it!

CISCO: BYOD [pdf]

Bring Your Own Device (BYOD) has become one of the most influential trends that has or will touch each and every IT organization. The term has come to define a megatrend occurring in IT that requires sweeping changes to the way devices are used in the workplace.


What is BYOD? Does it mean employees pay for their own devices they use for work? Possibly, but the BYOD trend means much more. It is about end users being able to use the compute and communication devices they choose to increase productivity and mobility. These can be devices purchased by the employer, purchased by the employee, or both. BYOD means any device, with any ownership, used anywhere.


This paper discusses the how this trend will affect businesses, explores the challenges it creates for IT, and outlines the Cisco® technologies that are part of the solution. Cisco offers a comprehensive architecture to address these challenges, allowing end users the freedom to bring their choice of device to work while still affording IT the controls to ensure security and prevent data loss.

 

A MUST read...

No comment yet.
Scooped by Gust MEES
Scoop.it!

Infographic: The Ten Things We Fear (And Love) About BYOD

Infographic: The Ten Things We Fear (And Love) About BYOD | 21st Century Learning and Teaching | Scoop.it
Everyone’s got a point-of-view about Bring Your Own Device. SAP and NetBase went and investigated this, and came back with the top things that people love and hate about BYOD.

 

Read more:

http://www.forbes.com/sites/sap/2012/07/16/infographic-the-ten-things-we-fear-and-love-about-byod/

No comment yet.
Scooped by Gust MEES
Scoop.it!

The growing headache of protecting mobile devices

The growing headache of protecting mobile devices | 21st Century Learning and Teaching | Scoop.it

Bring-Your-Own-Device (BYOD) schemes have become increasingly prevalent in most businesses worldwide, as employees look to use their own personal devices in a business context. When asked if employees valued certain devices over others, 89 per cent of those surveyed claimed this was the case.

 

“Rather than fight against the tide, organizations should embrace the use of these devices and work alongside staff to ensure that comprehensive IT policies and best practice guidelines are put in place to assist and inform employees about how their devices should be used. End-point protection for these devices is also crucial if businesses want to safeguard employees against an ever-changing, increasingly sophisticated threat landscape.”

 

Read more:

http://www.net-security.org/secworld.php?id=13245

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

National Cyber Security Alliance | StaySafeOnline.org

National Cyber Security Alliance | StaySafeOnline.org | 21st Century Learning and Teaching | Scoop.it

STATE OF U.S. CYBER EDUCATION
Every year, the National Cyber Security Alliance presents a National K-12 Study that looks the state of cyberethics, cybersafety, and cybersecurity training in our nation's schools.

 

FREE SECURITY CHECK UPS
The best way to protect yourself from viruses, malware and other online threats is by Keeping a Clean Machine. Check your computer for known viruses, spyware, and more and discover if your computer is... 

http://staysafeonline.org/stay-safe-online/free-security-check-ups

 

 

Read more:

http://staysafeonline.org/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOT: An idea whose time has come

BYOT: An idea whose time has come | 21st Century Learning and Teaching | Scoop.it
The time is now for districts and schools to seriously consider developing a bring-your-own-technology (BYOT) initiative.

 

 

 

 

Gust MEES: Read also my blog "Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure" http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more:

http://smartblogs.com/education/2012/07/05/byot-an-idea-whose-time-come/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Multi-platform backdoor malware targets Windows, Mac and Linux users

Multi-platform backdoor malware targets Windows, Mac and Linux users | 21st Century Learning and Teaching | Scoop.it
A web-based malware attack has been discovered, targeting users of Windows, Mac and Linux.

Although the amount of malware written for different operating systems can vary, it's becoming increasi...

 

Visiting a hacked webpage, triggers a JAR (Java Archive) file which will ask permission to do its business - secretly determining if you are running Windows, Mac OS X or Linux.

 

Read more:

 

http://nakedsecurity.sophos.com/2012/07/11/backdoor-malware/?utm_source=twitter&amp;utm_medium=status%2Bmessage&amp;utm_campaign=naked%2Bsecurity

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | 21st Century Learning and Teaching | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD

Scooped by Gust MEES
Scoop.it!

Beginners IT-Security Guide

Beginners IT-Security Guide | 21st Century Learning and Teaching | Scoop.it

In 21st Century we need not ONLY talking about Internet-Safety, Online-Safety and IT-Security, but we need to secure our computers and ANY other related device connecting to Internet, such as also our smartphones! I will present you now a tutorial on How-To create best protection (as on March 2012) for your computer and this with mostly FREE tools and FREE Online Services…

 

Also will I provide you a worksheet which helps you planning your weekly tasks!

 

In 21st Century while using "Bring Your Own Device" (Hashtag for Twitter = #BYOD) there is a MUST to know about basic IT-Security knowledge! The teachers role is NOT anymore to be the MOST important person, but the LEARNER! So the teacher needs to have that basic knowledge to share it with its learners and to try to keep a safe Learning Workspace... Online and Offline, in the "internal learning network" and also in the "external learning network"!

 

As Teachers, Educators and Instructors we have to deal with Apps, OpenSource software, Freeware, different OS devices, so we need to know about the risks and dangers! We need to know how to get protected these devices also!

 

It's not ONLY the IT-Admin's responsibility, IT-Security is the responsibility of ALL of us!!!

 

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/ ;

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 - http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

- http://www.scoop.it/t/ict-security-tools

 

 

- http://www.scoop.it/t/securite-pc-et-internet

 

 

 

                       ===> Be aware of the malware! <=== 

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Why Do I Need Antivirus Software Anyway?

Why Do I Need Antivirus Software Anyway? | 21st Century Learning and Teaching | Scoop.it
A key point to remember here is that most malware is designed such that it should remain hidden from users who aren’t proactively looking for it. Hence you could well have an infected computer right now without even realising it.

 

Read more:

http://www.security-faqs.com/why-do-i-need-antivirus-software-anyway.html

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Computer Viruses and Threats

Computer Viruses and Threats | 21st Century Learning and Teaching | Scoop.it

What it teaches


This video explains computer viruses by comparing them to human viruses and focuses on the role of prevention in being protected. Major points include:

 

- A basic look at computer viruses as computer programs that can spread like a disease and can be prevented by anti-virus software.

 

- An introduction to worms, how they cause damage in networks and can be prevented by software updates.

 

- An introduction to trojans, how they trick people into downloading a virus and how awareness is important for prevention.

 

Check for more videos here:

http://www.commoncraft.com/video/computer-viruses-and-threats

 

No comment yet.
Rescooped by Gust MEES from The Flipped Classroom
Scoop.it!

An Illustration of Flipped Classroom: The Full Picture

The Flipped Classroom: The Full picture is not about watching videos as homework.

 

Learn more / En svoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Flipped-Classroom

 


Via JackieGerstein Ed.D.
Gust MEES's insight:

The Flipped Classroom: The Full picture is not about watching videos as homework.

 

Learn more / En svoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Flipped-Classroom

 

Alyssa T. Cerroni's curator insight, June 23, 2017 8:33 AM

"The Flipped Classroom: The Full picture is not about watching videos as homework."

 

This quick video de-bunks myths about The Flipped Classroom and gives a holistic picture of how The Flipped Classroom works. The Flipped Classroom is experiential and leads to concept exploration.

Dena Van den Bosch's curator insight, June 27, 2017 3:05 PM
"Now what?" is the most important  question in a #flipclass
La French witch's curator insight, July 23, 2017 3:43 AM
Une illustration du concept de classe inversée. Vidéo en anglais. 
Scooped by Gust MEES
Scoop.it!

New update for Mozilla Firefox

New update for Mozilla Firefox | 21st Century Learning and Teaching | Scoop.it

Mozilla releases Firefox 14 and encrypts Google searches by default

Adds improved mouse recognition in games
By Lawrence Latif
Tue Jul 17 2012, 16:00


SOFTWARE DEVELOPER Mozilla has released Firefox 14 for desktop operating systems.
Mozilla's Firefox web browser has received its six-week update with Firefox 14 automatically encrypting Google searches and supporting the Pointer Lock API. Mozilla has also included support for fullscreen mode in Mac OS X 10.7.


Mozilla said it encrypts Google search data by default, adding that users can now easily verify the identity of a web site by clicking on an icon to the left of the URL. According to Mozilla, the addition of search encryption is particularly handy for those using Firefox on wireless connections.

 

Source: The Inquirer http://www.theinquirer.net/inquirer/news/2192288/mozilla-releases-firefox-14-and-encrypts-google-searches-by-default?utm_campaign=INQ&amp;amp;utm_source=Twitter&amp;amp;utm_medium=Twitterfeed

 

 

Gust MEES: I will include in the future also updates for your browsers as for e-Learning IT-Security is a MUST!!! So, update your browsers, please. Check out also my free courses about IT-Security to be sure that your devices for e-Learning are updated:

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD: Haven’t got a policy? Maybe it’s time you did

BYOD: Haven’t got a policy? Maybe it’s time you did | 21st Century Learning and Teaching | Scoop.it
Most organisations still don’t have a strategy for dealing with the demands of bring your own device - but pressure to have one continues to bui...

 

As a result, he said, companies are increasingly putting a BYOD policy in place. According to IDC’s research, 20 per cent of companies have a BYOD policy in place and 15 per cent are working on it. But that leaves the majority - 65 per cent - nowhere on this issue yet.

 

Simon Gale, CTO at IBM workplace services, said that as a result of BYOD, IT organisations are looking for new ways to secure their infrastructure, as the security perimeter changes from the physical device to the data.

 

“You had a standardised layer that was the device and the operating system. What BYOD is doing is taking away that opportunity for standardisation and so the IT department is trying to work out where that level is”.

 

Read more:

http://www.techrepublic.com/blog/european-technology/byod-havent-got-a-policy-maybe-its-time-you-did/850?tag=nl.e101

 

 

No comment yet.
Rescooped by Gust MEES from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Cisco: The Biggest Mobile BYOD Deployment Around? [Slides]

Cisco: The Biggest Mobile BYOD Deployment Around? [Slides] | 21st Century Learning and Teaching | Scoop.it

There are 50,538 smartphones and tablets in use at Cisco, which has 71,825 employees. Not only does that already comprise a ratio of one device per 1.4 employees, said Lance Perry, vice-president of IT customer strategy and success for Cisco, during an excellent presentation at the Consumerization of IT in the Enterprise (CITE) conference in San Francisco on Monday. But the 50,000+ device figure is also an increase of 52% from just 12 months earlier.

 

Read more: the practice...

http://www.forbes.com/sites/sap/2012/03/05/cisco-the-biggest-mobile-byod-deployment-around/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

European Cyber Security Month -ECSM-material now available

European Cyber Security Month -ECSM-material now available | 21st Century Learning and Teaching | Scoop.it
ENISA has developed a series of free material to support the EU Member States in their preparations for the European Cyber Security Month.

 

Citizens are increasingly relying on the internet in their everyday lives for banking, shopping, education and communication. It is, therefore, important that they are able to use the internet in a secure and confident manner.

 

ENISA has developed a series of free material to support the EU Member States ===> prepare their cyber security education and awareness campaigns in the context of the European Cyber Security Month. <===

 

This material is an important tool in reaching people and getting them to change their behaviour, or to reinforce good behaviour.

 

Read more:

http://www.enisa.europa.eu/media/news-items/european-cyber-security-material-now-available-online

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Cyber-Hygiene: ICT Hygiene for Population, Education and Business

Cyber-Hygiene: ICT Hygiene for Population, Education and Business | 21st Century Learning and Teaching | Scoop.it

Read, think, learn and share over Social Media… Security is everyone’s responsibility!

 

===> We are ALL responsible for Internet’s future! <===

 

Cyber-Hygiene: ICT Hygiene for Population, Education and Business

 

Read more:

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Google Online Security against state-sponsored attacks

Google Online Security against state-sponsored attacks | 21st Century Learning and Teaching | Scoop.it

According to a post of Eric Grosse, VP of security engineering at Google, on Google Online Security blog the company is constantly monitoring the web for malicious activity on its systems, with particular attention to attacks made by third parties to illegally access into users’ accounts.

 

Google declared that is ready to adopt measurements to mitigate cyber threats each time they receive an alert from intelligence or from their clients and also when their monitoring procedures reveal anomalies.

 

The company is preparing to offer a specific protection service for a restrict number of users that could be target of state-sponsored attacks. Every user potentially at risk will be advised with a message like the one proposed in the following picture:

 

Read more:

http://securityaffairs.co/wordpress/6263/cyber-crime/google-online-security-against-state-sponsored-attacks.html

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Singapore marks cyber security awareness day

Singapore marks cyber security awareness day | 21st Century Learning and Teaching | Scoop.it
FutureGov – Transforming Government | Education | Healthcare...

 

Singapore holds its second annual Cyber Security Awareness Day (CSAD) today, with nationwide talks, exhibitions and roadshows promoting the agenda. The call-to-action garnered support from over 634,000 individuals and organisations.

 

The purpose of the CSAD, according to its website, is “to reinforce the security awareness messages and as a reminder of the threats in the cyber world”.

 

Talks have been held at public libraries throughout the city on protecting the “digital life”, on securing mobile devices, and on raising digital natives for parents. Visitors to the facebook page can also take part in several quizzes that test the participants’ knowledge of cyber security.

 

Read also:

 

http://gustmees.wordpress.com/2012/05/05/get-smart-with-5-minutes-tutorialsit-securitypart-5-not-only-internetsafety-also-it-security

 

 

http://gustmees.wordpress.com/2012/05/16/ideas-for-a-more-secure-internet-part1national-security-day-as-a-family-day/

 

 

- http://gustmees.wordpress.com/2012/05/16/ideas-for-a-more-secure-internet-part2it-security-scouts-in-schools/

 

 

Read more:

 

http://www.futuregov.asia/articles/2012/jul/11/singapore-marks-cyber-security-awareness-day-over-/

 

 

No comment yet.
Rescooped by Gust MEES from iGeneration - 21st Century Education (Pedagogy & Digital Innovation)
Scoop.it!

Digital Safety Kit from Yahoo - digital citizenship

Digital Safety Kit from Yahoo - digital citizenship | 21st Century Learning and Teaching | Scoop.it
The new Yahoo! Digital Safety Kit makes it easy for you to educate and empower children to be safe and responsible digital citizens.

 

Gust MEES, Internet-Safety alone isn't enough anymore, basic IT-Security knowledge is also needed; check out also my FREE courses about IT-Security:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

-  http://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/

 

 

Read more:

http://safely.yahoo.com/kit

 


Via Tom D'Amico (@TDOttawa)
No comment yet.