RSS

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

20 Dec
CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

.

Learning basics of IT-Security and Cyber-Security

.


CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

We are ALL responsible for the internet

.

Internet safety is the responsibility of EVERYONE! It isn’t actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes… Let us call them <===> CyberHygiene <===> as they are about care anyway.

WHAT do WE have to take care about!? Check below please:

.

 

  • Updates about our “Operating System” (OS)
  • Updates about so-called “Third Party Programs”
  • Back-up from our files and/or the whole Hard Disk
  • Installation of protection-software, anti-malware, anti-spyware tools included…
  • Protection of our privacy
  • Encryption
  • Secure Passwords

MOST of the above mentioned are automated tasks, SO NO way to NOT use THEM 😉 GET used to IT! GET the reflexes!

For more in depth knowledge, check below please (more theory):

Check ALSO about the How-To from the EU (Europe):

.

eSkills map_0

Click the above image please to access the article.

.


The PracTICE / How To Get The Right Reflexes To Stay Secure?

programmerman-animated

          • First of ALL, check my blog ===> Cyber-Security Practice: Learn it in one week <=== and follow ALL the steps.
          • Chose a day in the week where YOU control YOUR updates and YOUR computers & mobiles security! I suggest the Friday, as I created on Twitter the “Friday Security Check Day“, hashtag = #FSCD. Get used to it on any Friday, get THE reflex!
  • On any second Tuesday on each month Microsoft and Adobe publish new updates, install THEM! THEY are a MUST! It’s the Patch-Tuesday!
  • Introduce a pledge in YOUR family, where every family member MUST sign and accept it! It will give a Community feeling and RESPONSIBILITY!

.

Learn more:

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

..

Keywords necessary for me to create this blog post: eSkills, eCitizen, #digcit, EU, Europe, 21st Century LEARNing, collaboration, lifelong LEARNing, learning to learn, coaching, accelerated learning, le mieux apprendre, time management, tagboard, curation, PLN, PKM, Social Media, Twitter, catalyst, amplifier, Modern Edu, Twitter Chat’s, Social Media, curation, blogging, Multimedia, LEARNing To LEARN, Life-Long LEARNing, PLN, PKM, Twitter, Updates, third party applications, BYOD, malware, botnets, mobile security, CyberSecurity, community feeling, community responsibility,

Stay tuned for next blog posts 😉

 

.

.

 

Advertisement
 
Leave a comment

Posted by on December 20, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Advisory Board, Andragogy, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Autodidact, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Design Learning, Differentiated Instruction, Digital CitizenShip, Digital Footprint, Education, Education 4.0, eLeadership, eLearning, Encryption, Engagement, eSkills, Ethical Mind, Europe, Free courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, Global, HowTo, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IT-Security Scouts, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Personal Learning Network (PLN), Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Privacy, Professional Development, Quality Courses, Reality, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Self-directed Learning, Seniors, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Technology Integration, Third Party Applications, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

 
%d bloggers like this: