21st Century Learning and Teaching
586.6K views | +3 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Business', 'Cybersecurity'. Clear
Scooped by Gust MEES
Scoop.it!

10 Questions to Ask When Creating a Cybersecurity Plan for Your Business

10 Questions to Ask When Creating a Cybersecurity Plan for Your Business | 21st Century Learning and Teaching | Scoop.it
Practical tips for protecting your company from hackers and other online threats.
Gust MEES's insight:

 

Read the complete Report from SYMANTEC here [PDF]:

 

https://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

 

 

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

10 security best practice guidelines for businesses

10 security best practice guidelines for businesses | 21st Century Learning and Teaching | Scoop.it
Businesses need extreme security measures to combat extreme threats. Here are ten best practices that provide defense against the majority of all security threats.
Gust MEES's insight:

 

                      ===> An educated user is a safer user. <===

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Gust MEES's curator insight, March 4, 2013 4:04 PM

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Infographic of the week: Why ignoring information security is lethal

Infographic of the week: Why ignoring information security is lethal | 21st Century Learning and Teaching | Scoop.it

Infographic of the week: Why ignoring information security is lethal


Via Frederic GOUTH, Gust MEES
No comment yet.
Scooped by Gust MEES
Scoop.it!

Here are the most important aspects of BYOD to consider

Here are the most important aspects of BYOD to consider | 21st Century Learning and Teaching | Scoop.it
Here are the most important aspects of BYOD to consider before implementation.

 

 

 

 

 

 

 

 

 

 

 

Gust MEES: check out also my FREE course about it here 

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more. a MUST:

http://www.fedtechmagazine.com/article/2012/08/5-takeaways-cio-councils-byod-toolkit

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD - nur ein Wunsch der IT-Freaks

BYOD - nur ein Wunsch der IT-Freaks | 21st Century Learning and Teaching | Scoop.it

Bring-Your-Own-Device (BYOD) bedeutet, dass der Zugriff auf die Unternehmensdaten und -Programme mittels der eigenen mobilen Endgeräten, also Smartphones und Tablets, erfolgt. Glaubt man Marktforschern, ist BYOD äußerst trendy – aber offensichtlich nur bei einer sehr kleinen Mitarbeitergruppe.

 

Mehr erfahren:

http://blog.chip.de/business-blog/2012/09/05/byod-nur-ein-wunsch-der-it-freaks/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Ten Ways to Handle Insider Threats

Ten Ways to Handle Insider Threats | 21st Century Learning and Teaching | Scoop.it

Tough economic times make it tempting for an employee to switch his white hat to a black one for financial gain. Insider threats also include contractors, auditors, and anyone who has authorized access to systems.

 

Read more, A MUST...

 


Via IS Decisions, Gust MEES
No comment yet.
Scooped by Gust MEES
Scoop.it!

#SMBchat on Symantec Internet Security Threat Report on Thursday, April 25, at 9 a.m. PT / 12 p.m. ET

#SMBchat on Symantec Internet Security Threat Report on Thursday, April 25, at 9 a.m. PT / 12 p.m. ET | 21st Century Learning and Teaching | Scoop.it
Symantec helps consumers and organizations secure and manage their information-driven world.

 

The ISTR, which covers the major threat trends observed by Symantec in 2012, reveals that cybercriminals view SMBs as a prime target for stealing information. In fact, the largest growth area for targeted attacks in 2012 was businesses with fewer than 250 employees; 31 percent of all attacks targeted them, representing a threefold increase from 2011.

 

Getting a clear understanding of the dangers is an important step in improving security, and this year’s report is a wake-up call that SMBs are now being specifically targeted by cybercriminals.

 

===> Mark your calendars to join #SMBchat and learn how to protect your small business from attackers. <===

 

Gust MEES's insight:

 

===> Mark your calendars to join #SMBchat and learn how to protect your small business from attackers. <===

 

Gust MEES's curator insight, April 22, 2013 1:56 PM

 

===> Mark your calendars to join #SMBchat and learn how to protect your small business from attackers. <===


Rescooped by Gust MEES from #CyberSecurity #CyberSécurité #Security #Sécurité #InfoSec #CyberDefence #GDPR #RGPD #DevOps #DevSecOps #SecDevOps
Scoop.it!

L’impact financier de la cybercriminalité sur les entreprises étant de plus en plus grand, avoir un taux de détection élevé permet de réaliser des économies

L’impact financier de la cybercriminalité sur les entreprises étant de plus en plus grand, avoir un taux de détection élevé permet de réaliser des économies | 21st Century Learning and Teaching | Scoop.it
Détecter 1% de malware supplémentaires peut permettre à une entreprise d’économiser plusieurs milliers d’euros dans les coûts inhérents au nettoyage (...)

Via Frederic GOUTH
Gust MEES's insight:
L’impact financier de la cybercriminalité sur les entreprises étant de plus en plus grand, avoir un taux de détection élevé permet de réaliser des économies


Gust MEES's curator insight, February 25, 2013 3:09 PM
L’impact financier de la cybercriminalité sur les entreprises étant de plus en plus grand, avoir un taux de détection élevé permet de réaliser des économies


Scooped by Gust MEES
Scoop.it!

Small Business Online Security [Infographic]

Small Business Online Security [Infographic] | 21st Century Learning and Teaching | Scoop.it
No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD research again exposes security fears

BYOD research again exposes security fears | 21st Century Learning and Teaching | Scoop.it
A new joint study from KnowBe4 and ITIC (Information Technology Intelligence Consulting) has revealed that nearly three quarters of businesses which approve of BYOD have nothing specific in place to ensure security.

 

Specifically, 71% of BYOD-friendly corporations polled had no specific procedures in place to support BYOD development, which is an extremely worrying statistic.

 

The research, which surveyed 550 companies globally throughout July and August, was described as a “wake-up call” by ITIC principal analyst Laura DiDio.

 

Research from connectivity experts iPass revealed a similar opacity with enterprise device responsibility, noting at the time: “A balance needs to be found between issuing IT-controlled smartphones and letting a certain subset of employees own the responsibility for their own devices”.

 

Gust MEES: read also my FREE course about it here https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more:

http://www.appstechnews.com/news/2012/sep/07/byod-research-again-exposes-security-fears/?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Rescooped by Gust MEES from 21st Century Tools for Teaching-People and Learners
Scoop.it!

Cisco: The Biggest Mobile BYOD Deployment Around? [Slides]

Cisco: The Biggest Mobile BYOD Deployment Around? [Slides] | 21st Century Learning and Teaching | Scoop.it

There are 50,538 smartphones and tablets in use at Cisco, which has 71,825 employees. Not only does that already comprise a ratio of one device per 1.4 employees, said Lance Perry, vice-president of IT customer strategy and success for Cisco, during an excellent presentation at the Consumerization of IT in the Enterprise (CITE) conference in San Francisco on Monday. But the 50,000+ device figure is also an increase of 52% from just 12 months earlier.

 

Read more: the practice...

http://www.forbes.com/sites/sap/2012/03/05/cisco-the-biggest-mobile-byod-deployment-around/

 

No comment yet.