RSS

Category Archives: Backdoors

SID2016: Safer Internet Day 2016-Participation

SID2016: Safer Internet Day 2016-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2016 – Save the date!

.

SID16-banner

.

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2016 will be celebrated on Tuesday 09 February 2016, with the strapline of ===> “Play your part for a better internet” <=== following the success of last year’s campaign.

This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.

For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.

Keep checking back for the latest news as the SID 2016 starts to take shape.

.

SID2016-Poster

.

 

 Click the above image to access the article, please.

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2016

programmerman-animatedWHAT is special this year with my participation on SID2016

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2016 in Luxembourg/Europe.

.

BEESECURE-SID-Gust MEES-18-01-2016

.Click the image above, please, to access the article.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2016 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2016 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.

.

You can find me also on:

.
.
Stay tuned for next blog post(s) 😉

.

 
Leave a comment

Posted by on January 18, 2016 in "Dirty Dozen Countries" with SPAM, 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Advisory Board, Analyzing, Andragogy, Annotum-Theme, Apple Malware, Apps, Articles with co-authors, Autodidact, Awareness, Backdoors, BEE CREATIVE, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Criticism, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Design Learning, Device Theft, Digital CitizenShip, Digital Footprint, Education, Education 4.0, eLeadership, eLearning, Encryption, Engagement, eSkills, Ethical Mind, Europe, European Cyber Security Month, Facebook, FAQ, Feedback, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, Global Collaboration, HotSpot, How To stay organized, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Interviews, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Motivation, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, PC Cleaning, PC Maintenance, Personal Learning Network (PLN), Personal profit, Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Project Based Learning, PUPs, Quality Courses, Reality, Reflecting, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Self-directed Learning, Seniors, SID2016, Skills, Smart TV's, Social Engineering, Social Media, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Team-Teaching, Technology Integration, Third Party Applications, Tracing, TU-DRESDEN, Twitter, Twitter Chat, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

.

Learning basics of IT-Security and Cyber-Security

.


CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

We are ALL responsible for the internet

.

Internet safety is the responsibility of EVERYONE! It isn’t actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes… Let us call them <===> CyberHygiene <===> as they are about care anyway.

WHAT do WE have to take care about!? Check below please:

.

 

  • Updates about our “Operating System” (OS)
  • Updates about so-called “Third Party Programs”
  • Back-up from our files and/or the whole Hard Disk
  • Installation of protection-software, anti-malware, anti-spyware tools included…
  • Protection of our privacy
  • Encryption
  • Secure Passwords

MOST of the above mentioned are automated tasks, SO NO way to NOT use THEM 😉 GET used to IT! GET the reflexes!

For more in depth knowledge, check below please (more theory):

Check ALSO about the How-To from the EU (Europe):

.

eSkills map_0

Click the above image please to access the article.

.


The PracTICE / How To Get The Right Reflexes To Stay Secure?

programmerman-animated

          • First of ALL, check my blog ===> Cyber-Security Practice: Learn it in one week <=== and follow ALL the steps.
          • Chose a day in the week where YOU control YOUR updates and YOUR computers & mobiles security! I suggest the Friday, as I created on Twitter the “Friday Security Check Day“, hashtag = #FSCD. Get used to it on any Friday, get THE reflex!
  • On any second Tuesday on each month Microsoft and Adobe publish new updates, install THEM! THEY are a MUST! It’s the Patch-Tuesday!
  • Introduce a pledge in YOUR family, where every family member MUST sign and accept it! It will give a Community feeling and RESPONSIBILITY!

.

Learn more:

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

..

Keywords necessary for me to create this blog post: eSkills, eCitizen, #digcit, EU, Europe, 21st Century LEARNing, collaboration, lifelong LEARNing, learning to learn, coaching, accelerated learning, le mieux apprendre, time management, tagboard, curation, PLN, PKM, Social Media, Twitter, catalyst, amplifier, Modern Edu, Twitter Chat’s, Social Media, curation, blogging, Multimedia, LEARNing To LEARN, Life-Long LEARNing, PLN, PKM, Twitter, Updates, third party applications, BYOD, malware, botnets, mobile security, CyberSecurity, community feeling, community responsibility,

Stay tuned for next blog posts 😉

 

.

.

 

 
Leave a comment

Posted by on December 20, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Advisory Board, Andragogy, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Autodidact, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Design Learning, Differentiated Instruction, Digital CitizenShip, Digital Footprint, Education, Education 4.0, eLeadership, eLearning, Encryption, Engagement, eSkills, Ethical Mind, Europe, Free courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, Global, HowTo, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IT-Security Scouts, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Personal Learning Network (PLN), Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Privacy, Professional Development, Quality Courses, Reality, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Self-directed Learning, Seniors, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Technology Integration, Third Party Applications, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Facts To Convince Someone For THE MUST Of LEARNing Basics Of CyberSecurity | Digital CitizenShip

Facts To Convince Someone For THE MUST Of LEARNing Basics Of CyberSecurity | Digital CitizenShip

.

 

We are ALL responsible for the internet

 Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Visual Walk On The Internet

programmerman-animatedLet us go for an ===> Visual walk <===  on what the internet is, try to follow me please:  YOU know what it means driving a car on the High way and the ===> Responsibility <=== about it, right!? YOU are driving together with hundreds of OTHERS on the same lane, OK? SO… NOW imagine (that is REALITY, anyway…), driving with millions together on the same ===> High Way <=== on a virtual view! Did I say virtual, YES! And that is exactly what happens WHEN YOU are ONLINE! YOU are driving virtually (YOUR computer, Smartphones, tablets through YOUR browser…) with OTHERS on THE same Data-High-Way without seeing it, BUT that is REALITY!

.

EDUcation and Schools RESPONSIBILITY: a safe place for the LEARNers, students! Because of the internet there are NOT ANYMORE walls in the schools and SO the safe place is ALSO the internet!

.

Related links, learn more:

 

.

Online Safety Redefined

Click the above image, please, to access the article.

 

.

WHY CyberSecurity Starts At Home

Click the above image, please, to access the article.

 

Learn more:

 


 Cybercrime

 

cybercrime-$400 billion-2013

 

.

Learn more:

.


Wearables, Watchables, Internet of Things, Internet of Everything

 

Wearables-CyberSecurity-2015

Click the above image, please, to access the article.

 

.

 

InternetofThings means Internet of Threats-2015

Click the above image, please, to access the article.

 

Learn more:

.

Personal Data-cisco-IoT

 

.

.

After having read this and YOU are STILL NOT convinced about THE MUST of LEARNing the basics of CyberSecurity and Digital CitizenShip, YOU SHOULD ask YOURSELVES if YOU are on the ===> NAIVETY STATUS <=== OR already on the ===> MATURITY STATUS <===, thus meaning if YOU take YOUR RESPONSIBILITY for the future of OUR kids 😉

This implies ALSO to OUR way of THINKing about the technology and ICT, WE MUST develop a sense of Awareness for CyberSecurity and Privacy! ===> LEARNing-To-LEARN <===

« Good habits formed at youth make all the difference. » Aristotle

YOU are STILL feeling YOUNG, aren’t YOU 😉

.

 

First Steps When Kids Go Online

Click the above image, please, to access the article.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Keywords necessary for me to create this blog post: RESPONSIBILITY, what is the internet?, comparison Virtual World and Real World, highway, Internet of Things, Internet of Everything, Social Media, PracTICE, Learning to learn digital citizenship, CyberAttacks interactive maps, REALITY,

.

Stay tuned for next blog post(s) 😉

.

.

 
3 Comments

Posted by on March 7, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, Browsers, BYOD, Coaching, Competency, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital CitizenShip, Education, eLeadership, eLearning, Encryption, eSkills, Ethical Mind, Europe, Facebook, Free courses, FREE-courses, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Of Things, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Parents, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Quality Courses, Reality, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Skills, Social Engineering, Social Media, Student Centred, Students 21st Century Survival Guide, Synthesizing Mind, Third Party Applications, Twitter, Understanding the internet, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

SID2015: Safer Internet Day 2015-Participation

SID2015: Safer Internet Day 2015-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2015 – Save the date!

.

 

.SID15_Banner_anim

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2015 will be celebrated on Tuesday 10 February 2015, with the strapline, once again, of ===> “Let’s create a better internet together” <=== following the success of last year’s campaign.

This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.

For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.

Keep checking back for the latest news as the SID 2015 starts to take shape.

.

SID2015-Poster

 Click the above image to access the article, please.

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2015

programmerman-animatedWHAT is special this year with my participation on SID2015

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2015 in Luxembourg/Europe.

.

SID2015-BEESECURE

 

Click the image above, please, to access the article.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2015 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2015 AND #Up2Us to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.

.

You can find me also on:

.
.
Stay tuned for next blog post(s) 😉

.

 
4 Comments

Posted by on January 6, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Collaboration, Competency, Connected Educators, Critical Thinking, Critical Thinking-a need!, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Encryption, Engagement, Europe, Facebook, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, Global Collaboration, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Parents, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2015, Skills, Smart TV's, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Tracing, Tutorials, Twitter, Understanding the internet, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

.

We are ALL responsible for the internet

 

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html


.

SID15_Banner_anim

.

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

sharing-iconWE can’t say any more that CyberSecurity is ONLY for IT-Experts as the internet is a shared ecosphere where every body has responsibility! Actions of some people can easily affect everyone else, thus meaning: WHEN NOT having installed protection software (updated antivirus) YOUR computer and/or smartphone(s) could get infected by malware and YOU will infect ALSO OTHERS who are in contact with YOU; it will become epidemic!

.

WHY CyberSecurity Starts At Home

 Click the above image to access the article, please.

.

Guidelines for securing your home

 Click the above image to access the article, please.

.

Learn more about the “Internet of Things“:

 

 


How To Take OUR Responsibility!? Let’s make CyberHygiene!

Well, that’s actually NOT that difficult, it’s ONLY the first steps who could be unusual and WE need to get used to it. BUT that’s the same with any other first time, isn’t it 😉

========> WE call it CyberHygiene. <=========

.

French (Français): Danger connu est danger vaincu ! Mieux vaut prévoir que valoir ! Un enfant averti en vaut deux. English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! Vorsicht heisst die Mutter der Porzellankiste!  

« Good habits formed at youth make all the difference. » Aristotle

.

SO, let’s go for it, check below please:

.

Top 5 Questions	Parents	Have	About	Cybersecurity

Click the above image to access the article, please.


Global Impact Of CyberSecurity

Let us have a look ALSO about WHAT the EU and the US are saying about CyberSecurity, so that YOU know about the IMPORTANCE, check below, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.


THE HowTo For BEST Protection

programmerman-animatedPlease find below the BEST possible protection as well as tips for individuals (for companies there would be much more…) explained step by step with a minimum use of technical language so that YOU might be able to understand it and to use it comfortable:

.

.

 1.What are the biggest security threats to kids?

1.What are the biggest security threats to kids?

Learn more about: 1.What are the biggest security threats to kids?


2. How do I talk with my child about security?

2. How do I talk with my child about security?

Learn more: 2. How do I talk with my child about security?

  • to be updated… Will get discussed in detail in my new blog post…

3. How do we protect our family’s computers?

3. How do we protect our family's computers?

Learn more: 3. How do we protect our family’s computers?


4. How do we protect our mobile devices?

4. How do we protect our mobile devices?

Learn more: 4. How do we protect our mobile devices?


 5. Why do we always hear “Never share your passwords”?

5. Why do we always hear "Never share your passwords"?

Learn more: 5. Why do we always hear “Never share your passwords”?


AND Don’t Forget About Privacy!

You’d be surprised how many things an app can learn about you and what you do. Without you ever knowing it.

Clueful is the only way to really understand iOS apps, how they use your private data and treat your privacy. This one-of-a-kind product identifies intrusive applications and shows you what they do behind your back.

.

Bitdefender Clueful

.

Learn more in my blog post: ===> Digital CitizenShip: Social Media AND Privacy <===

 

.

book-question-markLearn more:

.

.

Keywords necessary for me to create this blog post: #FSCD promoted by EDU as Homework, ideas, Social Media, twitter, Facebook, CyberHygiene, reflexes, digital citizenship, digcit, eSkills,

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.

 
8 Comments

Posted by on November 18, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Competency, Connected Educators, Critical Thinking, Critical Thinking-a need!, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Encryption, Europe, Facebook, FAQ, FBI, For a Better World, Free courses, FREE-courses, Future Work Skills, Global, Home-Work, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Internet Of Things, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Not ONLY rights but also responsibilities, Often Asked Questions, Parents, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Proactive Thinking, Professional Development, Quality Courses, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Twitter, Updates, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Twitter Chat | The Economic Impact Of Cybercrime

Twitter Chat | The Economic Impact Of Cybercrime

.

 

Learning basics of IT-Security and Cyber-Security

.


Twitter Chat | The Economic Impact Of Cybercrime

.

SecChat McAfee

 

On Thursday, September 4th there will be #SecChat who will explore the  The Economic Impact Of Cybercrime and is an hour-long Twitter chat. I got invited through Twitter by 

.

#SecChat

.

After long reflection I decided to create a blog about my advice as I think that it would be very difficult to answer these questions by Tweets. There are TOO MANY links and information, as well as advice to share that in the mass of shared Tweets they would get lost 😉 This allows me then in the Tweet on the Chat to post ONLY one link, the link to this blog, where ALL the necessary information are included and I could concentrate on the other Tweets much more easy!

AND I could ALSO use this blog post for my FREE courses about CyberSecurity!

As a reminder (ALSO for me), here below the blog posts about WHAT would get discussed:

I suggest to read my blog post from a previous Twitter Chat WHERE already a lot was discussed, please:

 

Here, below, is about the #SecChat:

.

#SecChat about

.

So here we go, my questions:

  • Q1: What security risks do SMBs need to consider when starting a business and why?
  • Q2: CyberSecurity is OUR ALL Responsibility! SHOULDN’T the basics of CyberSecurity getting taught in schools up from the early age?
  • Q3: WHY aren’t CyberSecurity professionals, especially CyberSecurity companies present at schools!?
  • Q4: WHAT could get done to lowering Cybercrime?

 


Q1: What security risks do SMBs need to consider when starting a business and why?

programmerman-animatedWell, first of all SMBs don’t have to forget that they deal with employees and that THE weakest link in the security chain is the human!

.

Please check my following blog posts who explain in detail:

.

As nearly everyone is using a smartphone today so there is ALSO a MUST to consider a “BYOD-Policy” (Bring Your Own Device) as the use of smartphones could be a BIG security risk to the SMB’s as MOST employees don’t have any knowledge about the basics of Cyber-Security, even that there smartphones and/or tablets, laptops could be infected with virus, trojans, keylogger

Please read my blog post about BYOD below:

.


Q2: CyberSecurity is OUR ALL Responsibility! SHOULDN’T the basics of CyberSecurity getting taught in schools up from the early age?

My personal answer is a clear YES! My prepared FREE courses below:

 AND Today on September 1st 2014 I found this on the internet which I highly WELCOME! Coding in the curriculum for Five-Year-Old with introduction to CyberSecurity, GREAT!

.

Five-Year-Old learn Coding

 

Click the image to access the article, please.

.

 


Q3: WHY aren’t CyberSecurity professionals, especially CyberSecurity companies present at schools!?

.

.

.

 

.

.

.


Q4: WHAT could get done to lowering Cybercrime?

Well, there are a lot of possibilities, who are MOSTLY related to ===> EDUCATION <=== and while using Social Media. Personally I use very often Twitter to send my advice to my readers. I started ages ago the ===> Friday Security Check Day <===, hashtag is ===> #FSCD <=== as a reminder and to wake up people to get THE reflexes, check below, please.

.

#FSCD

.

I would feel happy if anybody else would join in to the ===> #FSCD <=== to remind people and to give them good advice, and/or to retweet it, thanks.

.

Concerning the ===> Internet Of Things <=== here below my advice. Would be good if discussed…

.

#SecChat #IoT

.

 

More about the Internet Of Things:

 

And for me the MOST IMPORTANT is to teach ===> Cyber Hygiene <=== in schools and in companies! THE user (us ALL) must have basics knowledge of Cyber Security as it is a national security issue and also a priority for the economy!

.

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”

.

Check also what CIO.GOV An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

.

My curation about Cyber-Hygiene

I advocate ===> CyberHygiene <=== and ===> Proactive THINKing <=== since ages and the below action makes me feel happy!

.

CyberHygiene

 

.

.

I started ALSO days ago to amplify the word ===> #CyberHygiene <=== by posting each day about it on Twitter, see below! WELCOME to join in 😉

.

Twitter CyberHygiene-1

Twitter CyberHygiene-2

Twitter CyberHygiene-3

Twitter CyberHygiene-4

.

I am convinced about that such actions SHOULD get used to make the users (us ALL) ===> #WakeUP <=== for a more secure internet!

 

My curation about:

.

EUROPOL 2014

 Click the image to access the website, please.

.

economic-impact-of-cybercrime-report-2014

.

Below some examples of Tweets:

 

Did YOU take care about YOUR today? Are YOUR ? Check ===> https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/ <===  

.

DYK: can GET used on 2 ways? 1 way to avoid the worst, another way 2 make things happen by knowing habits, behavior 😉

.


How To Use Curation For Learning and Even Teaching

I will give you some visual examples below who show you, so you can have a direct impression of it. No need to talk too much (what most of the teachers and educators do, sorry…), we go straight to the point…

.

Curation insight-1

As you can see in the above screenshot, there is some text and also some links linking to similar content… The above screenshot is taken from ===> http://www.scoop.it/t/securite-pc-et-internet?q=Why+%28And+How%29+Teachers <===

.


The Transcript From The Chat

Coming soon,as soon as available…

.

.

.

..

.


Final word

chat iconA security by 100% doesn’t exist and probably NEVER will exist (I am sure about THAT!) , remind the human behavior…, and ALSO  the bugs in programming code of software!

There is one word which any SMB MUST remember ===> Proactive THINKing <===, anything is changing that quick that nobody could act mostly in time!

Related articles:

Stay informed about what is happening on a daily base about Cyber-Security to get prepared for the UNKNOWN! It’s the letter “I” in “ICT“, which means “Information“! Once NEW information gathered which isn’t known YET by the employees, then comes the letter “C“, which means “Communication“! Inform YOUR employees and ICT-Staff as soon as possible, remember that in the “Security Chainanyone MUST be strong!

===> THE MOST IMPORTANT when making training is to NOT use TOO MUCH technology words so that the employees might be able to UNDERSTAND! <===

Read my curation:

.


Ideas For A More Secure Internet

Since already 1999 I was publishing online about the risks and Cyber Security and by seeing the unwillingness of people to learn about it I was going for ===> #DeepTHINKing <=== about WHAT could get done, here below my ideas:

.

Some of the above ideas could get made into practice in ===> #MakerSpaces <=== and/or in ===> #Coding places <===, check below, please:

.

I encourage my readers and followers from Twitter to be ===> lurkers <=== on the #SecChat to learn about it, thanks.

.

 

#SecChat

.

Keywords necessary for me to create this blog post: economy, CyberSecurity, CyberCrime, InternetSafety, NAIVETY, Ignorance, data loss, data breaches, reputation, confidence, trust, intellectual property, CyberHygiene, RESPONSIBILITY, Proactive Thinking,

.

 

GUST-AVRIL2014-800px-2.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

 

.

Stay tuned for next blog post(s) 😉

.

.

 
4 Comments

Posted by on August 29, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Competency, Connected Educators, Copyright, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Europe, European Cyber Security Month, FAQ, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, Global, Global Collaboration, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Monitor, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Project Based Learning, Quality Courses, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Skills, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Tracing, Tutorials, Twitter, Twitter Chat, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Twitter Chat: Security risks SMBs face

Twitter Chat: Security risks SMBs face

.

Learning basics of IT-Security and Cyber-Security

.


On Monday, June 9th there will be #cyberSAFEchat who will explore the security risks SMBs face during every phase of growth and learn how to best protect against these threats. The hour-long Twitter chat will address the following key questions:

  • Q1: What security risks do SMBs need to consider when starting a business and why?
  • Q2: How do these risks change as the business grows and why?
  • Q3: How can lapses in security impact a SMB?
  • Q4: What tools and tips would you recommend that SMBs use to secure themselves, their employees and their customers?

I got invited through Twitter by @CSID:

.

Twitter Chat SMB and CyberSecurity

.

After long reflection I decided to create a blog about my advice as I think that it would be very difficult to answer these questions by Tweets. There are TOO MANY links and information, as well as advice to share that in the mass of shared Tweets they would get lost 😉 This allows me then in the Tweet on the Chat to post ONLY one link, the link to this blog, where ALL the necessary information are included and I could concentrate on the other Tweets much more easy! So here we go:

.

Q1: What security risks do SMBs need to consider when starting a business and why?

programmerman-animatedWell, first of all SMBs don’t have to forget that they deal with employees and that THE weakest link in the security chain is the human!

.

Please check my following blog posts who explain in detail:

.

As nearly everyone is using a smartphone today so there is ALSO a MUST to consider a “BYOD-Policy” (Bring Your Own Device) as the use of smartphones could be a BIG security risk to the SMB’s as MOST employees don’t have any knowledge about the basics of Cyber-Security, even that there smartphones and/or tablets, laptops could be infected with virus, trojans, keylogger

Please read my blog post about BYOD below:

.

Another risk to consider is the webpage of the SMBs! A webpage can be a very BIG risk when it is compromised and it would infect the computers and BYOD stuff from visitors (employees, customers and other…)!

.

And didn’t WE forget something!? YES, WE MUST consider ALSO so called “Third Party Applications” as bugs in programming code of software are ALWAYS inevitable! Nobody is perfect! If that would be the case, ALL programs would STILL be on version 1.0 😉 Right? Got it? Check ALSO, please:

.

As a reminder: What are SMBs?


Q2: How do these risks change as the business grows and why?

.

greatest security threat to organizations

Image credit ===>  http://www.tripwire.com/state-of-security/security-awareness/security-its-us-vs-them-or-is-it/ <===

.


Q3: How can lapses in security impact a SMB?

1ibdy1vf6wghd-n05dgl-aigainformation1As already mentioned above in Q1, once the website (webpage) is infected then any visitors, employees and customers included could get infected by the simple visit of that website. it is called “Drive-by download“! WE MUST also consider “Data-Breaches” where ALL the information of the customers and employees would get exposed on the internet! All of the above mentioned will NOT be a funny situation as it brings a BAD reputation to the SMBs, possible legal actions against them and a loss of customers, even perhaps a bankruptcy…

.

drive-by-download

Image credit:

===> http://www.microsoft.com/security/sir/glossary/drive-by-download-sites.aspx <===

.

Related articles:

.


Q4: What tools and tips would you recommend that SMBs use to secure themselves, their employees and their customers?

sharing-iconFirst of all: I recommend to train the employees about Cyber-Security and the risks that the SMBs encounter through involuntary actions from their employees (ignorance) and/or their BYOD stuff! This training should include, see my following blog posts, please:

There is one word which any SMB MUST remember ===> Proactive THINKing <===, anything is changing that quick that nobody could act mostly in time!

Learn more about ProactiveTHINKing:

.

Concerning tools, WE should consider different ones:

  • Webpage security
  • BYOD
  • Server Security

Here a non exhaustive list of a variety of tools:

Described in one word, I would say that WE ALL, SMBs and any user SHOULD get used to a ===> Cyber-Hygiene!!! <===, read my blog about, please:

.

CS_Infographic_SMB2014_FINALweb3

 

Infographic credit ===> http://www.csid.com/2014/06/cybersafe-webinar-series-recap-smb-security-for-every-phase-of-growth/ <===

.

Useful links and providers of Cyber-Security solutions:

 

This blog will get updated after the chat tonight, where I will include the transcript as any other useful information…


The Transcript From The Chat Tonight

So, as any GOOD Twitter Chat makes a “Transcript”, this one made one ALSO, which YOU can find below.

.

#cyberSAFEchat transcript

Please check the whole transcript here ===> https://storify.com/CSID/cybersafechat-smb-security-through-all-stages-of?utm_campaign=&utm_medium=sfy.co-twitter&utm_content=storify-pingback&utm_source=direct-sfy.co&awesm=sfy.co_jkFv <===

 


Final word

chat iconA security by 100% doesn’t exist and probably NEVER will exist (I am sure about THAT!) , remind the human behavior…, and ALSO  the bugs in programming code of software!

There is one word which any SMB MUST remember ===> Proactive THINKing <===, anything is changing that quick that nobody could act mostly in time!

Related articles:

Stay informed about what is happening on a daily base about Cyber-Security to get prepared for the UNKNOWN! It’s the letter “I” in “ICT“, which means “Information“! Once NEW information gathered which isn’t known YET by the employees, then comes the letter “C“, which means “Communication“! Inform YOUR employees and ICT-Staff as soon as possible, remember that in the “Security Chainanyone MUST be strong!

===> THE MOST IMPORTANT when making training is to NOT use TOO MUCH technology words so that the employees might be able to UNDERSTAND! <===

Read my curation:

.

Keywords for this post: CASES, my articles, CyberSecurity, BYOD, Privacy, Awareness, Training, CyberHygiene, Policies, Reflexes each week, reminding reflexes, human behavior, weakness, security chain and human, Naivety, HowTo ideas, Government help, FREE courses from Government, PHISHING, Spear-Phishing,

.

Stay tuned for next blog posts, some are already in preparation 😉

.

 

ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?

ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?

.

Evolution of Education: Wordle Logo.


ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?

programmerman-animatedGovernment and Education MUST be digital illiterates when NOT accepting that it is time for TEACHing the basics of Cyber-Security! By reading the reports of experts from the professional companies from Cyber-Security protection software, one MUST accept the facts that Cyber-Crime is evolving at a very rapid rate! Cyber-criminals learned How-To trick the users and THEY are inventing every day NEW tricks to trick THEM (US ALL), BUT Education and ALSO the Government are NOT YET ready to counter such actions! 

WE have to ACCEPT that (that are facts!!!)  20% of all malware ever created appeared in 2013 and THAT there are 31.53 % infected computers worldwide!!! That MUST give people a kick for Deep-Thinking! In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever existed, with a total of 30 million new malicious strains in circulation, at an average of 82,000 per day. Check article below, please:

Isn’t it time to introduce in Schools as a MAIN core ===> LEARNing the basics of Cyber-Security <=== as WE are ALL using computers and ===> BYOD <=== (Bring Your Own Device) and actually ALSO using Mobile-LEARNing and e-LEARNing!? WE can’t anymore bury the heads in the sand and NOT wanting to see the problems! THE reality is there and it can’t get fought ONLY by giving the IT-Admin of the school THAT responsibility, that is pure NONSENSE and a Middle Ages mentality, excuse-me, please!

==========> WE are ALL responsible for a secure internet! <==========

.


How Could This Be Realized And Up From Which Age?

programmerman-animatedI suggest to teachInternet-Safetyup from the age of 5 years old and the basics ofCyber-Security to the kids up from the early age, 8 years old! THEY would be able to understand how to get used to reflexes! These reflexes SHOULD get repeated once a week. I suggest the Friday as I started it ages ago already on Social-Media Twitter. It is called the ===> Friday Security Check Day <=== and the Hashtag for it is ===> #FSCD <=== SO, as it is under the age of the terms of use from Twitter, parents need to get involved as well to help THEIR kids to become GOOD “Digital Citizen” and by the same way the parents will learn also and with that COLLABORATION WE are on the winning side to make the internet a more secure place! Everybody will profit from it 😉

======> Safer Internet Day: Children need educating from age of 5, say campaigners <======

Read more:

.

 

Digital-Citizenship-infographic-620x965

Image credit ===> https://magic.piktochart.com/v/49853c8b-b418-406a-b979-0b240ca62352 <===

Check upper corner on right-hand side, there is “Digital Security” mentioned 😉 It should actually be ===> Cyber-Security <===

BUT anyway, it is THE BEST explication I ever have seen about “Digital Citizenship“!!!

 


SO… WHAT’S About Basic Cyber-Security Knowledge NOW As It Is Mentioned As Well!?

programmerman-animated.

That’s actually the easiest part of it, MOST of YOU think that it is the MOST difficult one, BUT it isn’t at ALL 😉 It’s ONLY based on reflexes and a one-time installation of software on YOUR computers (Smartphones included…).  Please check my following blog posts and YOU will see how easy it is:

 

Related articles, YOU might check as well for BETTER understanding (secret TIP):

.

==========> A Proactive-THINKing and Critical-THINKing will get created which is a MUST in a modern, technology driven society!!! <==========

.

YOU should ALSO be interested about ===> Youth Leadership and Students Voice <=== where YOUR students, learners will take themselves the responsibility for THEIR future, check below, please:

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

.


 

.

Keywords, necessary for me to create this blog post: Collaboration, parents, teachers, kids, students, learners, weekly reflex, #FSCD, Updates more important than Anti-Virus, Mind-Set-SHIFT, a lot of very quick changes, adapting, Proactive-Thinking, analyzing the facts, brain upgrade and NOT ONLY computer upgrade, How could this be done?, ideas, most malware hosted in…, NSA, Privacy, Cyber-espionage, looking for European hosted cloud services, F-Secure,

.

Stay tuned for next blog post(s) 😉

.

.

 
3 Comments

Posted by on March 19, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Copyright, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Engagement, Europe, Facebook, FBI, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Quality Courses, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, Stalking, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Tutorials, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

My Published Articles About Cyber-Security In The Press And Social Media

My Published Articles About Cyber-Security In The Press And Social Media

.

Learning basics of IT-Security and Cyber-Security.


My Published Articles About Cyber-Security In The Press And Social Media

programmerman-animatedBeing online since 1998 I realized very quickly that “Every Medal Has Its Reverse” and ALSO what Physic laws tells us “Where is positive there is also negative and both make 100%” (differently explained). OR, in OTHER words, there is BAD and GOOD people! I realized very quickly that through the internet, in the Virtual-World, the BAD guys have BIG chances to make THE BIG money and by reading a lot of PC-Magazines in English, French and German as well by getting informed through the internet. I learned about Cyber-Security and How-To get protected.

Being a diligent learner and always wanting to share my knowledge with others, I started a website about it (later some more in different languages…) , actually the first (private) one and second in general in my country Luxembourg (Europe). At the time people told me that I am crazy to talk about Cyber-Security, NO ONE was realizing about the impact of virus, trojans, backdoors, DDoS, Scam, and other Cyber-Beasts

NOW, WE have to deal with Cyber-Crime, Cyber-EspionageCyber-Attacks, Cyber-War, Cyber-Warfare, Botnets,  Cyber-Hygiene, where OUR computers (Smartphones included…) are part of such BAD actions!!!

SO… Later on (2004), already 13 years ago (in 2017) my FREE courses were available on the server of the “Ministry of Education from Luxembourg” (Europe); the FIRST courses about Cyber-Security and Safer Internet in Luxembourg EDUcation, check screenshot below, please…

.

Gust-MySecureIT

.

In 2004 I became ALSO member of the Advisory-Board from CASES (CYBERWORLD AWARENESS &
SECURITY ENHANCEMENT) and from BEE-SECURE. I won ALSO an National Contest, organized by Education, about Cyber-Security with a Mix-Team (one young [12 years old] woman and a 40 years old woman) in 2004 (February 06, 2004).


February 2004

Together with two young students and my temporary assistant Diane, WE won a national contest themed “Multimedia Poster“, please find below the article in German:


15-06-2004:

I participated on a “Journée Pédagogique“, organized by “NorTIC” and “eLuxembourg” (Ministry of EDUcation Luxembourg) on 15-06-2004, where I presented my knowledge and my “BEST PracTICEs” with ICT at that time. I had a BIG success with IT! There were ALSO EDUcators, TEACHers present as visitors from different countries to lurk around WHAT is NEW; such as “Robert GOBERT“, WHO wrote a book and mentioned me in it.

Please click on the images to enlarge them.

 

Journée Pédagogique-HOSINGEN-NorTIC-15-06-2004

ROBERT-GOBERT-GUST MEES-2004-2005

ROBERT-GOBERT-GUST MEES-2004-2005-2

ROBERT-GOBERT-GUST MEES-2004-2005-3

 
..
Links:
.

There were articles published about me from Luxembourg Newspaper “Luxemburger Wort” on 08.05.2006 and on 04.10.2008, where I don’t have any web address, as NOT existing anymore on their server(s), need to find out…

.

Gust MEES-Tageblatt 13.11.2007

The above article (partial view) was published in Luxembourg on “Tageblatt” on 13.11.2007.

.

On March 2008 there was a major infection of a very popular website through a “Cross-Site-Scripting” and the press was reporting about it and posting it ALSO on Social-Media. I replied to them on Social-Media and I got interviewed, whereby my interview was published on March 18, 2008 and later in April 02, 2008 an other article from me followed, see links below, please:

.


In February 23, 2006 I was presenting an innovation, a theater piece about Cyber-Security to explain the youth about the dangers of the Virtual-World (the internet). It was a great success, read my blog about it below, please:

.

LTML-TIP-Gust-Artikel-Presse

Click the image to enlarge it, please.

.


Curation and EdTech Tools

13-02-2012

Gust MEES-Scoop.it-21C Tools-13-02-2012

Click the above image, please, to access the article.

In 2011 I started something what was NEW for me, Curation on Scoop.it, and in November 2011 I got interviewed and honored by the title “Lord Of Curation“. It was published on November 30, 2011, check it below, please:

Actually (2014) I am very present on Social-Media with nearly 65k posts on Twitter and I am involved in a lot of Twitter-Chats and conversations on Twitter, through them I meat ALSO online friends and one of them, Doug PETERSON contacted me to make an interview which was published on Doug’s Blog on March 12, 2013, check below, please:

.


5 Excellent Resources for Teaching Students about cyber-Safety

05-08-2013

.

Gust MEES-Educators Technology-InternetSafety-05-08-2013

Please click the image above to access the article.


Ransomware

And again (March 17, 2014) there was an article in the national press (WORT.LU) about Scam, actually about “RansomWare“, which was tweeted over Social-Media Twitter and where I replied to, to give them more and BETTER information about that Topic. I got replied by them that THEY made an Update about it online and ALSO that THEY recommend me, check below, please:

.

WORT-17.03.2014-Recommandation Gust MEES

.

WORT-article-online-Gust MEES-Recommandation-17.03.2014

.


19.03.2015: My blog “Education: Digital CitizenShip, CyberSecurity” was selected by the major Newspaper in Luxembourg (Europe):

.

Blog Selected By Luxemburger Wort-2015

.

.

WORT-Luxembourg-Blogosphere-19-03-2015

Click the image above, please, to access the article.

.


13.03.2015: Recommendations on LinkedIn

Recommendation-Gust MEES-LinkedIn

Click the above image to access the article, please.

..


09.12.2015: My FREE courses about Cyber Security referenced at TU-DRESDEN (Technical University DRESDEN / Germany)

.

TU-DRESDEN-09-12-2015-CyberSecurity-2

Click the above image please to access the article

.

TU-DRESDEN-09-12-2015-CyberSecurity-1

.

Related links:


2016

My blog “Education: Digital CitizenShip, CyberSecurity” was selected by the major Newspaper in Luxembourg (Europe):

.

Blog selected by Luxemburger Wort-2016


Beeing A Pioneer Gets Recognized!

icono_pioneer.

.

As I like challenges, I take part in international competitions for “Good PracTICES” in EDUcation and so did I here, see PIC below please… SO… NOW I am an “Open EDUcation Europa Pioneer“!

.

.

.

OPEN EDUCATION EUROPA 2016-Pioneer-Badge-Gust MEES

Click above image please, to access my blog posts.

.

..


I got mentioned as a reference from the Ministry of EDUcation in Luxembourg

I am feeling very honored for THIS ONE, please check below. It was published on 02-05-2017 in the Newsletter from the Ministry of EDUcation in Luxembourg.

.

Gust MEES-NEWSLETTER-MINISTRY of EDUCATION LUXEMBOURG-02-05-2017

Please click the above image to access the article.

..


I got selected and being part of the “Albert Index” for TOP EdTech Blogs

June 26, 2017

.

Gust MEES-ALBERT.io-03-09-2017

Please click the image to access the article.

.


eReputation and Marketing-Territorial (06-10-2017)

Check the article below, please, to read it (in French).

.

eReputation-Gust MEES-2017

Click the image above, please, to access the article.

.


2018

My blog “Education: Digital CitizenShip, CyberSecurity” was selected by the major Newspaper in Luxembourg (Europe):

.

WORT-blog-2018

.

WORT-2018-Selected Blogs-Blogospere-Gust MEES-Luxembourg

Click the image please to access the article


05-02-2020: 

I got mentioned in Luxembourg’s weekly magazine “revue” for my participation of the #SID2020, “Safer Internet Day 2020“!

.

REVUE-06-2020-SID2020-Gust MEES

.

REVUE-06-2020-SID2020-Gust MEES-2

.


23-07-2020

Through LinkedIn I got contacted from SEEEDSTUDIO asking me for a cooperation concerning their ARDUINO compatible products. I accepted to make a review of the Grove Beginner Kit for Arduino”. Check below please my tutorials:


GUST-AVRIL2014-800px-2.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

.Stay tuned for next blog post(s) 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?

Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?

.

Wordle-Logo-Apps

.


WHAT Are Apps?

[START Text from Wikipedia] A mobile app, short for mobile application, or just app, is application software designed to run on smartphonestablet computers and other mobile devices. The term “app” is a shortening of the term “application software“. It has become very popular and in 2010 was listed as “Word of the Year” by the American Dialect Society.[2] In 2009, technology columnist David Pogue said that newer smartphones could be nicknamed “app phones” to distinguish them from earlier less-sophisticated smartphones.[3] [END Text from Wikipedia]

.

Apps-usage-2013-infographic

Infographic credit ===> http://fluency21.com/blog/2013/04/21/all-about-apps-infographic/ <===

.

As already mentioned above: “Apps are designed to run on smartphones, etc.” means that they were created, actually programmed by humans and any code has bugs!

First WE need to know that WE are working with programmed code created by humans, and as ===> Nobody Is Perfect <=== so aren’t these programs. WE must also admit that NOT any programmer has the necessary knowledge about to create code for BEST Cyber-Security, NOR isn’t it possible to create 100% secure code, there is always a certain percentage of bugs in the code, thus meaning: there will be vulnerabilities in these programs!

I invite YOU to read the article(s) below for a deeper insight:

.


Creating Apps In Schools For Kids And Parents: WHAT Should WE Be Aware About!?

programmerman-animated

.

Apps are NOT ===> TOYS <===! There are STRICT rules to be followed as mentioned from the ===> U.S. Small Business Administration <===:

12. If you’re dealing with financial data, health data, or kids’ data, make sure you understand applicable standards and regulations

If your app deals with kids’ data, health data, or financial data, ensure you’re complying with relevant rules and regulations, which are more complex. The FTC offers details on the regulations that your business needs to be aware of in the following guides:

.

Find out the complete guidelines here, please:

.

.


Apps And Cyber-Security

Apart from programming errors, there are ALSO the bad boys (Cyber-Criminals) who are creating (programming) Apps to take the control over YOUR devices to earn money with them!

.

easy to hack Apps

Click the image to access the article who explains well in detail.

[START Text from TrendLabsSM 2013 Annual Security Roundup] On the mobile security front, we witnessed the mobile malware and high-risk app volume surpass the 1-million mark as early as September 2013.2. The current volume has, in fact, reached roughly 1.4 million, with 1 million new malicious and high-risk apps found in 2013 alone. [END Text from TrendLabsSM 2013 Annual Security Roundup]

.

Malicious and High-Risk Mobile App Growth, 2013

Image credit ===> http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-cashing-in-on-digital-information.pdf <===

.

Please find the full report of TrendLabsSM 2013 Annual Security Roundup here:

.

state_of_security_2014_11-Apps-hacked

 Click the above image to access the article, please.

.

Apps vulnerabilities

 Click the above image to access the article, please.

.

Click the above video to learn more.

.

Check out ALSO (A MUST to understand) the video below, please, who explains BEST:

.

And ALSO the McAfee LAbs Threats Report Fourth Quarter 2013

.

TOTAL MOBILE MALWARE 2013

TOTAL MOBILE MALWARE 2013

.

.


Good To Know: Who Is Hosting Most Of Malware And Spam?

I am getting asked very often who are the countries who host most of Malware and Spam, check below to find out, please.

.

Location Of Servers Hosting Suspect Content 2013

Location Of Servers Hosting Suspect Content 2013

.

TOP Countries Hosting Phishing And Spam URLs 2013

TOP Countries Hosting Phishing And Spam URLs 2013

.


Third Party App Stores, Avoid Them!

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01

.

The main distribution method of malware Apps is still shady apps downloaded via third-party app stores, say the Security experts! Thus meaning: download Apps ONLY from their ORIGIN website, please check below:

.


Smartphones Are Mini Computers With Phone Capability

Chat icon.

.

DON’T forget that Smartphones are Mini-Computers with phone capability and so YOU MUST treat them ALSO! Thus meaning: the same AWARENESS and PROTECTION is necessary as for computers ===> ANY OS & ANY DEVICE <===!

.

.

When Good Technology Goes Bad: Evolution of Mobile Technology

March 2014

Mobile hardware is evolving at an unbelievable rate. Think about it: the cell phone you are using right now has more computing power than the computers that sent Neil Armstrong into space a few decades ago. And not only has mobile technology been advancing so impressively, but the costs associated with the technology have been decreasing, making it more widely available and adopted.

Read more:

.


How To Protect OUR Smartphones?

programmerman2SO, now WE know about the online dangers, BUT How-To protect OUR Smartphones and tablets? Well, there are a lot of professional Security companies who offer protection tools, even as FREEWARE, check links below, please:

.

.


And WHAT About Privacy!?

sharing-iconTalking about Privacy? YES, in some countries Privacy isn’t really (not yet) a matter, BUT in EUROPE WE fight for OUR human right about PRIVACY! When WE work together with children WE need to take care about the DATA which is used from the kids in EDUCATION and ALSO, especially, the private data who is shared through the different APPS! MOST of people don’t even know about the word “Permissions” when THEY install APPS on their devices, and that is very BAD!

People expose so THEIR complete ONLINE LIFE (which is ALSO their private life in Real-World…) on the internet! This is THEIR “Digital Footprint” who is used by commercials to address them tailored advertising and ALSO, the MOST important, it is THEIR resume for future employers! OUR “Digital Footprint” will replace the resume in the future (even NOW already…) where employers find out what WE deed over years and SO can make a profile over their future (OR NOT) employees!

.

“When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.

“App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they’re free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.

.

Read more:

.

.

.

Apps Security and Privacy

Infographic credit ===> http://go.pronq.com/fortifymobile <===

.

Read more below, please, a MUST for understanding:

.


Are There Existing Tools To Let Me Know Which Apps I Should Be Cautious?

YES, there are FREE online tools where YOU get instant transparency while you’re using Apps on the Web or Facebook, such as App Advisor, who helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.

.

Farmville and Privacy

Click this link ===> App Advisor <===

.


Sounds like a lot of RESPONSIBILITY, isn’t it?

sharing-icon

.

The word RESPONSIBILITY, oh YES, do YOU still know what it means? Internet shows us all again that WE are ALL responsible about OUR actions, interactions with other people, same actually as in the REAL-WORLD 😉

.


Think For More…

DON’T forget about tools (Apps) ===> THEY are ONLY as good as the person who uses them and knows ALSO which tool to use for a specific task! <===

Deep-THINKing: DON’T use a screwdriver to hit nails 😉 Thus meaning: YOUR Professional Development needs to be Up-To-Date to know which tool to use and when to use it for a quality course!

.


Some Critical Thinking: Do I really need an app to do that?

Chat icon

.

There are tons of different Apps around and the average user has installed at least hundred (100) Apps on its device(s)!? Aren’t users dependent (addicted) already on Apps and on using THEIR Smartphones!? Was “Albert EINSTEIN” right!? Do WE really need ALL those installed Apps? Can WE still live without the internet and the Apps!? Imagine ONLY one day without YOUR Smartphone, how would YOU feel!?

.

.

Albert-EINSTEIN-Technology-Idiots

Image found on Twitter and edited to hide visages…

..


THE MUST HAVE Apps

Here below my non-exhaustive list of MUST-HAVE Apps:

.

And as WE know that the NSA is spying around (Cyberespionage) it would be a good idea to look for companies located in Europe instead in the USA for stocking OUR DATA! Check below for possibilities:

.

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

Keywords as a reminder for me to create this blog post: Privacy, Mobile-Security, Cyber-Security, Nobody-Is-Perfect, Bugs, Malware, Threat Report 2013, Mobile-Malware on the rise, FREE protection software and Apps, Privacy settings and awareness, Digital Citizen, Mobile Botnet, Curation links, Infographics, stress, too many Apps, do I really need an app to do that? Right use of tools, Third Party App Stores,

.

Stay tuned for next blog post(s) 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,