RSS

Cyber-Hygiene: ICT Hygiene for Population, Education and Business

11 Jul
Cyber-Hygiene: ICT Hygiene for Population, Education and Business

.

Learning IT-Security

.

Read, think, learn and share over Social Media… Security is everyone’s responsibility! We are ALL responsible for Internet’s future!

.


===> “Nothing in life is to be feared. It is only to be understood.” Marie Curie <===


Cyber-Hygiene: Hygiene for ICT in Education and Business, sounds strange isn’t it? I will tell you about what it is, try to convince you why we should use it and getting used to it, it’s similar as Hygiene in real world…


Cyber-Hygiene: ICT Hygiene for Population, Education and Business

.

.

Create your own banner at mybannermaker.com!Make your own banner at MyBannerMaker.com!


.
PANDA Security Report April-June 2012
Click image to enlarge for best view and click here for the link to the PANDA report [pdf]
 


. 

KEYWORDS FOR THIS FREE COURSE and what you will learn:

.

3fy5eowy8suq3-1dw42q-womannursegeraldg.01Proactive Thinking, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

. .


We need to compare real world with virtual world to understand

.

vdujwtjyx3uq-252anv-p2pnicubuculei01When we talk about Hygiene in real life we mean taking our daily shower or bath, washing often enough the hands, brushing the teeth minimum twice a day and we must talk also about health; thus meaning: visiting the doctor regularly to avoid serious problems, especially up from a certain age… Hygiene means taking care of our body to have best health and also the responsibility not to infect other people because of bad hygiene and bad health! We need also to be informed about how to stay health by following hygiene tips provided by Education and also by the “Health Ministry”, where we find folders on different places and in 21st Century also now on Internet… We get also taught on practices which are dangerous… That’s the awareness about…

.

Computer Viruses and Threats

Click image above to access video

.

In real world our car needs some maintenance and technical control to make sure that there is no danger for other participants in traffic (pedestrians and drivers…), so the same in virtual world. Our computer is the “virtual car” who is driving on the “Data Highway” (Internet), it needs maintenance and especially care about IT-Security and safety

.

Check also the video below and be surprised…

.

This video reveals the magic behind the magic, making people aware of the fact that their entire life can be found online.

.

.

.

So, when working with a computer and “BYOD” (Bring Your Own Device), where “BYOD” is not only computers but also tablets and smartphones, we need to take care of them, whatever “Operating System” (OS) is installed! Otherwise if these devices don’t have the right maintenance and the right “Hygiene” they could infect other Internet users; whereby “Cyber-Hygiene” means here:

.

Check the video below, who explains best.

.

Mikko Hypponen: Fighting viruses, defending the net

.

.


National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”

.

Check also what CIO.GOV An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

.

.

We need to build up a Cyber-Hygiene Culture/How-To

.

community-jpegWe need to build up a Cyber-Hygiene Culture for a more secure Internet and in this culture we are ALL involved as Internet is a global Network and we could help a lot by using the “Social Medias” to this by sharing our good practices with others…

.

.

Learn more about “Social Media and its Influence” here: .

.
This Cyber-Culture-Hygiene could get build up by the already mentioned propositions in this blog and also from IT-Security Experts and people with very good knowledge about IT-Security on an volunteer-base as I did and still will doing as described in my following blog: 
.
.

Why should we do this?

.

The Internet will attract more hackers

Infographics source

The above Infographic is only an estimation, but I agree with it that Cyber-Crime will become more important as already NOW TV’s with mini-computer have vulnerabilities http://www.scoop.it/t/securite-pc-et-internet?tag=TV, the rest you could imagine yourself! You should think also on the raise of “Bring Your Own Device” (Hashtag = #BYOD), so there are more and more people using their own devices on work, devices who could represent a danger and risks for the Network the are connecting to if not well secured; switch on your Critical-Thinking please! We need a Proactive-Thinking!

.

25% BYOD Infected

Check the complete slideshow here

.

See the facts in reports of 2012 by professional companies here: .

Don’t forget that a security by 100% doesn’t exist and that in the future any fridge, TV, and other technical domestic device will include a mini-computer who can connect to Internet! And any mini-computer is vulnerable… By knowing NOW the facts we see the reality, we are well informed NOW and our Critical Thinking should make us understand that Cyber-Hygiene is a MUST!

.

IT-Security Training in any company

Check the complete slideshow here

.


We need new ideas how this Cyber-Hygiene-Culture could get build up

.

Mausi-interrogatifSome say that it is very difficult to build up a Cyber-Hygiene-Culture and they are right with it because persons need first to understand the “invisible threats” and “attacks” which are present! I invite you to read my “curation” about it here:

.

.
By having read these articles you will be able to understand the risks by using your critical thinking and you will be able to understand also why it is necessary to teach and to use a “Cyber-Hygiene” and also to share your new acquired knowledge with others…

.

Concerning new ideas, I share already since 2003-2004 a lot of ideas on How-To a “Cyber-Hygiene” could get used, please check here:

.

.


Is this “Cyber-Hygiene” advice only a help for Education?

.

Mausi-loupeAs already mentioned above and in the title of this blog, not ONLY for Education, but also for business and of course more then ever NOW also for the whole population as the majority of people around the world are using Internet and that in the future there will be more people using Internet and this certainly more with smartphones than with computers!!!

.

.

.

 

.

.

Any device connected to Internet needs to get protected, so also smartphones! Check also some FREE Apps here:

.

.


How could Cyber-Hygiene get introduced to Business?

.

community-jpegI suggest that the IT-Admin  of each company organizes meetings with the companies staff where he and the managers explain to the staff the dangers of “BYOD” and “BYOT” and that the technical staff elaborates also a strong “User-Policy” whereby any employee needs to check his device on the end of the week for updates and security updates! This event will take only between 15 min-30 minutes and should be a MUST! IT-Admin could block access to devices who are not conform to those mentioned Policy! Employees will so not only get used to IT-Security and Awareness on work, but will know so also the reflexes for at home in private life and by knowing these reflexes they will certainly also tell their children at home as well and probably also their acquaintances

.

25% BYOD Infected

Check the complete slideshow here

.

Related links:

.

..

Check the complete slideshow here

.


How could Cyber-Hygiene get introduced to the Population?

.

awareness_bg_gallery_display

.

Above screenshot shows you how Singapore acted very well, learn more http://www.scoop.it/t/securite-pc-et-internet?tag=Singapore%20marks%20cyber%20security%20awarenessYou could do similar, a call to action 😉 Read the article to learn more…

.

Read also my blogs “Ideas for a more secure Internet“:

.


 Learning By Doing Through A Game

I invite YOU ALSO to play the game below, YOU will learn the basics of Cyber Security by ===>LEARNing By Doing <===, enjoy it 😉

.

VOVALABS CyberSecurity Game

Click the image, please, to access the game.

.

Check also the link below, please, where YOU find the details:


What say the professionals?

..

.

An article from Forbes (7/14/2012) that you must read: “The threat is serious, and the time to prepare for it is now. The increasingly sophisticated  tools to change the world are in everyone’s hands as new technologies are introduced, but they are in the hands of criminals. It’s the wild west in this new technological frontier and we will see who outsmarts whom.

.

Goodman’s big idea is to have ordinary citizens around the world leverage these very same technologies for good, and to play a more prominent role in maintaining the safety and security of themselves and other citizens.


What did we learn and what we MUST learn for a more secure Internet

.

.

WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01 .

    • We are ALL responsible for a secure Internet!
    • Automatic Windows Update must be enabled
    • For Apple devices: ALL the updates must be installed also!
    • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
    • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

===> I created a new Hashtag#FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

. Stay tuned for next free courses and tutorials 😉 .


Site Meter

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

15 responses to “Cyber-Hygiene: ICT Hygiene for Population, Education and Business

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.