Blog posts about Education, CyberSecurity, Digital Citizenship, Privacy, InternetSafety, curation, PKM, PLN, blogging, Global Collaboration, Coaching, Collaboration, eSkills, eLeadership, Coding, MakerED, MakerSpace, Social Media, How to learn, learning to learn
Why Is It Important To Read Specialized Magazines?
There are masses of Apps fromany kind of Topics and from anywhere around from the world, difficult to know WHAT choice to make, as well as there is also the problem with “Privacy” and “Cyber Security“. Therefore it is important to read the reviews from experts on the field. And there are ALSO people who prefer reading a magazine, than reading online and/or from an eBook. For Apps creators it is important to make Apps known to the public, so it might be good to give the public an overview of YOUR precious work đ These specialized magazines have ALSO an online presence…
.
Specialized Magazines For Apps in Europe
Please find below a non-exhaustive list of magazines from different countries:
There are tons of different Apps around and the average user has installed at least hundred (100) Apps on its device(s)!? Arenât users dependent (addicted) already on Apps and on using THEIR Smartphones!? Was âAlbert EINSTEINâ right!? Do WE really need ALL those installed Apps? Can WE still live without the internet and the Apps!? Imagine ONLY one day without YOUR Smartphone, how would YOU feel!?
.
Image found on Twitter and edited to hide visagesâŚ
ONLY Internet-Safety And NO Basics Of Cyber-Security Education In Schools!?
Government and Education MUST be digital illiterates when NOT accepting that it is time for TEACHing the basics of Cyber-Security! By reading the reports of experts from the professional companies from Cyber-Security protection software, one MUST accept the facts that Cyber-Crime is evolving at a very rapid rate! Cyber-criminals learned How-To trick the users and THEY are inventing every day NEW tricks to trick THEM (US ALL), BUT Education and ALSO the Government are NOT YET ready to counter such actions!Â
WE have to ACCEPT that (that are facts!!!)  20% of all malware ever created appeared in 2013 and THAT there are 31.53 % infected computers worldwide!!!That MUST give people a kick for Deep-Thinking! In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever existed, with a total of 30 million new malicious strains in circulation, at an average of 82,000 per day. Check article below, please:
Isn’t it time to introduce in Schools as a MAIN core ===> LEARNing the basics of Cyber-Security <=== as WE are ALL using computers and ===> BYOD <=== (Bring Your Own Device) and actually ALSO using Mobile-LEARNing and e-LEARNing!? WE can’t anymore bury the heads in the sand and NOT wanting to see the problems!THE reality is there and it can’t get fought ONLY by giving the IT-Admin of the school THATresponsibility, that is pure NONSENSE and a Middle Ages mentality, excuse-me, please!
==========> WE are ALL responsible for a secure internet! <==========
.
How Could This Be Realized And Up From Which Age?
I suggest to teach “Internet-Safety” up from the age of 5 years old and the basics of “Cyber-Security“ to the kids up from the early age, 8 years old! THEY would be able to understand how to get used to reflexes! These reflexes SHOULD get repeated once a week. I suggest the Friday as I started it ages ago already on Social-Media Twitter. It is called the ===> Friday Security Check Day <=== and the Hashtag for it is ===> #FSCD <=== SO, as it is under the age of the terms of use from Twitter, parents need to get involved as well to help THEIR kids to become GOOD “Digital Citizen” and by the same way the parents will learn also and with that COLLABORATION WE are on the winning side to make the internet a more secure place!Everybody will profit from it đ
======> Safer Internet Day: Children need educating from age of 5, say campaigners <======
Check upper corner on right-hand side, there is “Digital Security” mentioned đ It should actually be ===> Cyber-Security <===
BUT anyway, it is THE BEST explication I ever have seen about “Digital Citizenship“!!!
SO… WHAT’S About Basic Cyber-Security Knowledge NOW As It Is Mentioned As Well!?
.
That’s actually the easiest part of it, MOST of YOU think that it is the MOST difficult one, BUT it isn’t at ALL đ It’s ONLY based on reflexes and a one-time installation of software on YOUR computers (Smartphones included…). Â Please check my following blog posts and YOU will see how easy it is:
==========> A Proactive-THINKing and Critical-THINKing will get created which is a MUST in a modern, technology driven society!!! <==========
.
YOU should ALSO be interested about ===> Youth Leadership and Students Voice <=== where YOUR students, learners will take themselves the responsibility for THEIR future, check below, please:
Lâauteur Gust MEES est Formateur andragogique / pĂŠdagogique TIC, membre du âComitĂŠ Conseilâ de âLuxembourg Safer Internetâ (LuSI), appelĂŠ maintenant BEESECURE, partenaire officiel (consultant) du Ministère de lâĂŠducation au Luxembourg du projet  âMySecureITâ, partenaire officiel du Ministère du Commerce au Luxembourg du projet âCASESâ (Cyberworld Awareness and Security Enhancement Structure).
The author Gust MEES is ICT Course Instructor, âMember of the Advisory Boardâ from âLuxembourg Safer Internetâ (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project âMySecureITâ, Official Partner from the Ministry of Commerce in Luxembourg, project âCASESâ (Cyberworld Awareness and Security Enhancement Structure).
.
.
Keywords, necessary for me to create this blog post: Collaboration, parents, teachers, kids, students, learners, weekly reflex, #FSCD, Updates more important than Anti-Virus, Mind-Set-SHIFT, a lot of very quick changes, adapting, Proactive-Thinking, analyzing the facts, brain upgrade and NOT ONLY computer upgrade, How could this be done?, ideas, most malware hosted in…, NSA, Privacy, Cyber-espionage, looking for European hosted cloud services, F-Secure,
My Published Articles About Cyber-Security In The Press And Social Media
Being online since 1998 I realized very quickly that “Every Medal Has Its Reverse” and ALSO what Physic laws tells us “Where is positive there is also negative and both make 100%” (differently explained). OR, in OTHER words, there is BAD and GOOD people! I realized very quickly that through the internet, in the Virtual-World, the BAD guys have BIG chances to make THE BIG money and by reading a lot of PC-Magazines in English, French and German as well by getting informed through the internet. I learnedabout Cyber-Security andHow-To get protected.
Being a diligent learner and always wanting to share my knowledge with others, I started a website about it (later some more in different languages…) , actually the first (private) one and second in general in my country Luxembourg(Europe). At the time people told me that I am crazy to talk about Cyber-Security, NO ONE was realizing about the impact of virus, trojans, backdoors, DDoS, Scam, and other Cyber-Beasts…
SO… Later on (2004), already 13 years ago (in 2017) my FREE courses were available on the server of the “Ministry of Education from Luxembourg” (Europe); the FIRST courses about Cyber-Security and Safer Internet in Luxembourg EDUcation, check screenshot below, please…
.
.
In 2004 I became ALSO member of the Advisory-Board from CASES (CYBERWORLD AWARENESS &
SECURITY ENHANCEMENT) and from BEE-SECURE. I won ALSO an National Contest, organized by Education, about Cyber-Security with a Mix-Team (one young [12 years old] woman and a 40 years old woman) in 2004 (February 06, 2004).
February 2004
Together with two young students and my temporary assistant Diane, WE won a national contest themed “Multimedia Poster“, please find below the article in German:
I participated on a “JournĂŠe PĂŠdagogique“, organized by “NorTIC” and “eLuxembourg” (Ministry of EDUcation Luxembourg) on 15-06-2004, where I presented my knowledge and my “BEST PracTICEs” with ICT at that time. I had a BIG success with IT! There were ALSO EDUcators, TEACHers present as visitors from different countries to lurk around WHAT is NEW; such as “Robert GOBERT“, WHO wrote a book and mentioned me in it.
There were articles published about me from Luxembourg Newspaper “Luxemburger Wort” on 08.05.2006 and on 04.10.2008, where I don’t have any web address, as NOT existing anymore on their server(s), need to find out…
.
The above article (partial view) was published in Luxembourg on “Tageblatt” on 13.11.2007.
.
On March 2008 there was a major infection of a very popular website through a “Cross-Site-Scripting” and the press was reporting about it and posting it ALSO on Social-Media. I replied to them on Social-Media and I got interviewed, whereby my interview was published on March 18, 2008 and later in April 02, 2008 an other article from me followed, see links below, please:
In February23, 2006Â I was presenting an innovation, a theater piece about Cyber-Security to explain the youth about the dangers of the Virtual-World (the internet). It was a great success, read my blog about it below, please:
Click the above image, please, to access the article.
In 2011 I started something what was NEW for me, Curation on Scoop.it, and in November 2011 I got interviewed and honored by the title “Lord Of Curation“. It was published on November 30, 2011, check it below, please:
Actually (2014) I am very present on Social-Media with nearly 65k posts on Twitter and I am involved in a lot of Twitter-Chats and conversations on Twitter, through them I meat ALSO online friends and one of them, Doug PETERSON contacted me to make an interview which was published on Doug’s Blog on March 12, 2013, check below, please:
5 Excellent Resources for Teaching Students about cyber-Safety
05-08-2013
.
Please click the image above to access the article.
Ransomware
And again (March 17, 2014) there was an article in the national press (WORT.LU) about Scam, actually about “RansomWare“, which was tweeted over Social-Media Twitter and where I replied to, to give them more and BETTER information about that Topic. I got replied by them that THEY made an Update about it online and ALSO that THEY recommend me, check below, please:
As I like challenges, I take part in international competitions for “Good PracTICES” in EDUcation and so did I here, see PIC below please… SO… NOW I am an “Open EDUcation Europa Pioneer“!
.
.
.
Click above image please, to access my blog posts.
.
..
I got mentioned as a reference from the Ministry of EDUcation in Luxembourg
I am feeling very honored for THIS ONE, please check below. It was published on 02-05-2017 in the Newsletter from the Ministry of EDUcation in Luxembourg.
.
Please click the above image to access the article.
..
I got selected and being part of the “Albert Index” for TOP EdTech Blogs
June 26, 2017
.
Please click the image to access the article.
.
eReputation and Marketing-Territorial (06-10-2017)
Check the article below, please, to read it (in French).
.
Click the image above, please, to access the article.
I got mentioned in Luxembourg’s weekly magazine “revue” for my participation of the #SID2020, “Safer Internet Day 2020“!
.
.
.
23-07-2020
Through LinkedIn I got contacted from SEEEDSTUDIO asking me for a cooperation concerning their ARDUINO compatible products. I accepted to make a review of the “Grove Beginner Kit for Arduino”. Check below please my tutorials:
Lâauteur Gust MEES est Formateur andragogique / pĂŠdagogique TIC, membre du âComitĂŠ Conseilâ de âLuxembourg Safer Internetâ (LuSI), appelĂŠ maintenant BEESECURE, partenaire officiel (consultant) du Ministère de lâĂŠducation au Luxembourg du projet  âMySecureITâ, partenaire officiel du Ministère du Commerce au Luxembourg du projet âCASESâ (Cyberworld Awareness and Security Enhancement Structure).
.
The author Gust MEES is ICT Course Instructor, âMember of the Advisory Boardâ from âLuxembourg Safer Internetâ (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project âMySecureITâ, Official Partner from the Ministry of Commerce in Luxembourg, project âCASESâ (Cyberworld Awareness and Security Enhancement Structure).
[START Text from Wikipedia] A mobile app, short for mobile application, or just app, is application software designed to run on smartphones, tablet computers and other mobile devices. The term “app” is a shortening of the term “application software“. It has become very popular and in 2010 was listed as “Word of the Year” by the American Dialect Society.[2] In 2009, technology columnist David Pogue said that newer smartphones could be nicknamed “app phones” to distinguish them from earlier less-sophisticated smartphones.[3] [END Text from Wikipedia]
As already mentioned above: “Apps are designed to run on smartphones, etc.” means that they were created, actually programmed by humans and any code has bugs!
First WE need to know that WE are working with programmed code created by humans, and as ===> Nobody Is Perfect <=== so aren’t these programs. WE must also admit that NOT any programmer has the necessary knowledge about to create code for BEST Cyber-Security, NOR isn’t it possible to create 100% secure code, there is always a certain percentage of bugs in the code, thus meaning: there will be vulnerabilities in these programs!
I invite YOU to read the article(s) below for a deeper insight:
Creating Apps In Schools For Kids And Parents: WHAT Should WE Be Aware About!?
.
Apps are NOT ===> TOYS <===! There are STRICT rules to be followed as mentioned from the ===> U.S. Small Business Administration <===:
12. If youâre dealing with financial data, health data, or kidsâ data, make sure you understand applicable standards and regulations
If your app deals with kidsâ data, health data, or financial data, ensure youâre complying with relevant rules and regulations, which are more complex. The FTC offers details on the regulations that your business needs to be aware of in the following guides:
Apart from programming errors, there are ALSO the bad boys (Cyber-Criminals) who are creating (programming) Apps to take the control over YOUR devices to earn money with them!
.
Click the image to access the article who explains well in detail.
[START Text from TrendLabsSM 2013 Annual Security Roundup] On the mobile security front, we witnessed the mobile malware and high-risk app volume surpass the 1-million mark as early as September 2013.2. The current volume has, in fact, reached roughly 1.4 million, with 1 million new malicious and high-risk apps found in 2013 alone. [END Text from TrendLabsSM 2013 Annual Security Roundup]
The main distribution method of malware Apps is still shady apps downloaded via third-party app stores, say the Security experts! Thus meaning: download Apps ONLY from their ORIGIN website, please check below:
Smartphones Are Mini Computers With Phone Capability
.
.
DON’T forget that Smartphones are Mini-Computers with phone capability and so YOU MUST treat them ALSO! Thus meaning: the same AWARENESS and PROTECTION is necessary as for computers ===> ANY OS & ANY DEVICE <===!
.
.
When Good Technology Goes Bad: Evolution of Mobile Technology
March 2014
Mobile hardware is evolving at an unbelievable rate. Think about it: the cell phone you are using right now has more computing power than the computers that sent Neil Armstrong into space a few decades ago. And not only has mobile technology been advancing so impressively, but the costs associated with the technology have been decreasing, making it more widely available and adopted.
SO, now WE know about the online dangers, BUT How-To protect OUR Smartphones and tablets? Well, there are a lot of professional Security companies who offer protection tools, even as FREEWARE, check links below, please:
Talking about Privacy? YES, in some countries Privacy isn’t really (not yet) a matter, BUT in EUROPEWE fight for OURhuman right about PRIVACY! When WE work together with children WE need to take care about the DATA which is used from the kids in EDUCATION and ALSO, especially, the private data who is shared through the different APPS! MOST of people don’t even know about the word “Permissions” when THEY install APPS on their devices, and that is very BAD!
People expose so THEIR complete ONLINE LIFE (which is ALSO their private life in Real-World…) on the internet! This is THEIR “Digital Footprint” who is used by commercials to address them tailored advertising and ALSO, the MOST important, it is THEIR resume for future employers! OUR “Digital Footprint” will replace the resume in the future (even NOW already…) where employers find out what WE deed over years and SO can make a profile over their future (OR NOT) employees!
.
“When you look at most of the mobile apps, you accept the application and its privileges settings, and there is very little ability for you to customise those settings, so you either agree or disagree.
“App developers are trying to monetise their apps, because remember, most of these are being sold for $1.99 or they’re free, so the only way that they are going to make money is collecting and harvesting data, and selling it to a data house, who in turn is going to sell it to advertisers.
Are There Existing Tools To Let Me Know Which Apps I Should Be Cautious?
YES, there are FREE online tools where YOU get instant transparency while you’re using Apps on the Web or Facebook, such as App Advisor, who helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.
The word RESPONSIBILITY, oh YES, do YOU still know what it means? Internet shows us all again that WE are ALL responsible about OUR actions, interactions with other people, same actually as in the REAL-WORLD đ
.
Think For More…
DON’T forget about tools (Apps) ===> THEY are ONLY as good as the person who uses them and knows ALSO which tool to use for a specific task! <===
Deep-THINKing: DON’T use a screwdriver to hit nails đ Thus meaning: YOUR Professional Development needs to be Up-To-Date to know which tool to use and when to use it for a quality course!
.
Some Critical Thinking:Â Do I really need an app to do that?
.
There are tons of different Apps around and the average user has installed at least hundred (100) Apps on its device(s)!? Aren’t users dependent (addicted) already on Apps and on using THEIR Smartphones!? Was “Albert EINSTEIN” right!? Do WE really need ALL those installed Apps? Can WE still live without the internet and the Apps!? Imagine ONLY one day without YOUR Smartphone, how would YOU feel!?
.
.
Image found on Twitter and edited to hide visages…
..
THE MUST HAVE Apps
Here below my non-exhaustive list of MUST-HAVE Apps:
Access everything everywhere.
With younited, you’ll always have your stuff with you. Your music, movies and photos, younited on your mobile phone, computer or tablet.
And as WE know that the NSA is spying around (Cyberespionage) it would be a good idea to look for companies located in Europe instead in the USA for stocking OUR DATA! Check below for possibilities:
Lâauteur Gust MEES est Formateur andragogique / pĂŠdagogique TIC, membre du âComitĂŠ Conseilâ de âLuxembourg Safer Internetâ (LuSI), appelĂŠ maintenant BEESECURE, partenaire officiel (consultant) du Ministère de lâĂŠducation au Luxembourg du projet  âMySecureITâ, partenaire officiel du Ministère du Commerce au Luxembourg du projet âCASESâ (Cyberworld Awareness and Security Enhancement Structure).
The author Gust MEES is ICT Course Instructor, âMember of the Advisory Boardâ from âLuxembourg Safer Internetâ (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project âMySecureITâ, Official Partner from the Ministry of Commerce in Luxembourg, project âCASESâ (Cyberworld Awareness and Security Enhancement Structure).
.
.
Keywords as a reminder for me to create this blog post:Privacy, Mobile-Security, Cyber-Security, Nobody-Is-Perfect, Bugs, Malware, Threat Report 2013, Mobile-Malware on the rise, FREE protection software and Apps, Privacy settings and awareness, Digital Citizen, Mobile Botnet, Curation links, Infographics, stress, too many Apps, do I really need an app to do that? Right use of tools, Third Party App Stores,
Privacy In The Digital World-A MUST To Talk About It!
.
.
Since Edward SNOWDEN‘s revelations nearly everybody knows about the word “Privacy“, even those WHO were NOT interested about it, as it was worldwide broadcasted! This person did reveal WHAT is really happening in the so called “Virtual-World” (the internet) and how much secret services around the world are interested about to grab ANY information about ANY person WHO is online! BUT, it’s NOT ONLY them, ALSO Cyber-Criminals are looking for these information! And ALSO commercials who find out YOUR psychological profile through YOUR behavior on Social-Media!
.
Start Text from The Guardian:
The UN general assembly unanimously voted last week to adopt a resolution, introduced by Germany and Brazil, stating that “the same rights that people have offline must also be protected online, including the right to privacy”. Brazil’s president, Dilma Rousseff, and the German chancellor, Angela Merkel , were among those spied on, according to the documents leaked by Snowden.
===> The resolution called on the 193 UN member states “to review their procedures, practices and legislation regarding the surveillance of communications, their interception and collection of personal data, with a view to upholding the right to privacy of all their obligations under international human rights law”. It also directed Pillay to publish a report on the protection and promotion of privacy “in the context of domestic and extraterritorial surveillance … including on a mass scale”. <===
She told Berners-Lee that it was “very important that governments now want to discuss the matters of mass surveillance and right to privacy in a serious way”.
BUT is THAT all why I created this blog!? Certainly NOT, there is much more behind, mostly hidden by its creators BUT WHAT MUST get said to tell YOU to stay aware about WHAT YOU are publishing and on what you are get tracked in the “Virtual-World“, such as:
HTML5, NO needs of cookies anymore for Web Tracking and Geo-Localisation
===> Critical-THINKing: are WE creating a “Stalking-Society”!? <===
.
..
WHAT do the above mentioned articles really mean!?
WHEN WE are online WE are transparent already as website owners are using OUR data for commercial purposesand with posting more about OUR private life, especially on Social-Media (Twitter, Facebook and…) WE give THEM even more information about ourselves!
.
.
..
Network Hacking May Lead to Bigger Problems
[START Text from links below] While social networks donât have your bank account information or credit card number, they may provide enough personal data for hackers to answer security questions on other sites. If you use the same password for your Facebook as your PayPal or Amazon login, hackers could then take control of these accounts. [END Text from  links below]
Do WE Still Have Privacy Rights In The Digital World!?
According to latest press releases: Based on internal NSA documents, Der Spiegel reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung.Â
This blog will get updated as soon as I get new information and certain Topics, such as Google Glass, Skype in Global Education and Google+ Hangouts in Global Education will get updated and described later…
.
Lâauteur Gust MEES est Formateur andragogique / pĂŠdagogique TIC, membre du âComitĂŠ Conseilâ de âLuxembourg Safer Internetâ (LuSI), appelĂŠ maintenant BEESECURE, partenaire officiel (consultant) du Ministère de lâĂŠducation au Luxembourg du projet  âMySecureITâ, partenaire officiel du Ministère du Commerce au Luxembourg du projet âCASESâ (Cyberworld Awareness and Security Enhancement Structure)..The author Gust MEES is ICT Course Instructor, âMember of the Advisory Boardâ from âLuxembourg Safer Internetâ (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project âMySecureITâ, Official Partner from the Ministry of Commerce in Luxembourg, project âCASESâ (Cyberworld Awareness and Security Enhancement Structure).
.
My personal reminder keywords for creating this blog: Cyber-Security and privacy ===> Phishing, Kettenbriefe, chain letters, IBM, psychological profile, ads used by knowing psychological profile on Social Media, NSA, PRISM, GHCQ, HTML5, Apps, Google Glass, Skype, Google+ Hangouts, Laws in different countries, global EDUcation, smartphones, photos, GeoTagging, Google Latitude, Google’s Location History, WiFi, Foursquare, Klout… … . . . . ..
WHO is THE user who’s NOT in the interest of Cyber-Security programs BUT WHO is THE most important!?
.
THIS is a question which I have for more than 12 years in my memory and WHICH I didn’t have thecourage to speak out loudly! BUT NOW I do, let’s go. I have followed ALL possible actions from Governments worldwide and Europe actions and participated ALSO as an individual, as an individual who is involved in advisory boards from the Luxembourg Government, such as:
.
Lâauteur Gust MEES est Formateur andragogique / pĂŠdagogique TIC, membre du âComitĂŠ Conseilâ de âLuxembourg Safer Internetâ (LuSI), appelĂŠ maintenant BEESECURE, partenaire officiel (consultant) du Ministère de lâĂŠducation au Luxembourg du projet  âMySecureITâ, partenaire officiel du Ministère du Commerce au Luxembourg du projet âCASESâ (Cyberworld Awareness and Security Enhancement Structure).The author Gust MEES is ICT Course Instructor, âMember of the Advisory Boardâ from âLuxembourg Safer Internetâ (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project âMySecureITâ, Official Partner from the Ministry of Commerce in Luxembourg, project âCASESâ (Cyberworld Awareness and Security Enhancement Structure).
.
I am NOT complaining about WHAT those organisations made, which is very “THUMBS UP“, BUT it isn’t enough, sorry! WE forgot ALL to bring in the daily “USER”!!! The “daily users” are people like moms, seniors and adults! That is the part of the populationwho are out of school since very long, BUT THEY also need to get educated about Cyber-Security and Internet-Safety, THEY are ALSO “Digital Citizens“! There ===> MUST be <=== special programs created for that part of the population!
.
In my country Luxembourg (Europe) WE start such a program this year through BEESECUREÂ (co funded by the European Union), check below, please…
With the internet WE are going ===> global<=== and that is WHY I want to share such good practices with YOU đ One can learn from each other to make this place (internet) Â more secure! Together WE stand STRONG!
.
Keywords (as a reminder for me) to create this blog post: adults, seniors, NO courses for adults, for seniors about Cybersecurity, EU, Europe, privacy, America NR.1 in  Spam
Strange title isn’t it!? I am talking about reflexes, WHAT has THAT to do with Cyber-Security? A lot, actually even THE most when well applied! WE learned already in previous blogs WHY WE need protection ===> Learning the basics of Cyber-Security <=== and ALSO How To getBEST protection with mostly FREE software ===> Cyber-Security Practice: Learn it in one week <===, BUT is THAT enough?
===> NOT everything is automated, so it needs ahuman interaction, THE missing factor in previous posts which WE will discuss here in this blog. <===
.
.
===> There is some THEORY below, if YOU don’t want to read it switch to next chapter! BUT, it might be good to take the time one day to learn it as it is important to understand the WHY! <===
FYI: Brown text is THEORY, explications…
.
Let’s first decide what Cyber-Security is!
First of ALL: let us make one point clear! A Security by 100% doesn’t exist as ===> The weakest link in a security chain is the human! <=== and Nobody Is Perfect! The developed software ALSO is created by humans, so…! BUT, WE can learn to get a maximum of knowledge about Cyber-Security and protection as well, step by step! As more people have THAT knowledge and installed protection on any device and on any OS, as more secure the internet will be!
BUT, let us come back to Cyber-Security in general, WHAT is Cyber-Security? There are so many information on the internet about Cyber-Security, BUT none explains in depth with simple words WHAT it is! A lot of confusion for people who want to learn about it!
In fact it is everything WE should know for avoiding malicious actions WHO can get used to bring in danger a Government, Companies and ALSO private persons! And that is a lot WHO can get brought into that topic and should also be! WE should get used to ONLY one word ===> Cyber-Security <=== where by the following SHOULD be included, as they ALL are related to it, especially ALSO the human behavior:
Chose a day in the week where YOU control YOUR updates and YOUR computers & mobiles security! I suggest the Friday, as I created on Twitter the “Friday Security Check Day“, hashtag = #FSCD. Get used to it on any Friday, get THE reflex!
On any second Tuesday on each month Microsoft and Adobe publish new updates, install THEM! THEY are a MUST! It’s the Patch-Tuesday!
Introduce a pledge in YOUR family, where every family member MUST sign and accept it! It will give a Community feeling and RESPONSIBILITY!
.
.
Lâauteur Gust MEES est Formateur andragogique / pĂŠdagogique TIC, membre du âComitĂŠ Conseilâ de âLuxembourg Safer Internetâ (LuSI), appelĂŠ maintenant BEESECURE, partenaire officiel (consultant) du Ministère de lâĂŠducation au Luxembourg du projet  âMySecureITâ, partenaire officiel du Ministère du Commerce au Luxembourg du projet âCASESâ (Cyberworld Awareness and Security Enhancement Structure).
The author Gust MEES is ICT Course Instructor, âMember of the Advisory Boardâ from âLuxembourg Safer Internetâ (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project âMySecureITâ, Official Partner from the Ministry of Commerce in Luxembourg, project âCASESâ (Cyberworld Awareness and Security Enhancement Structure).
Keywords, necessary for me to create this blog post: Collaboration, parents, teachers, kids, students, learners, weekly reflex, #FSCD, Updates more important than Anti-Virus, Mind-Set-SHIFT, a lot of very quick changes, adapting, Proactive-Thinking, analyzing the facts, brain upgrade and NOT ONLY computer upgrade, How could this be done?, ideas, most malware hosted in…, NSA, Privacy, Cyber-espionage, looking for European hosted cloud services, F-Secure,
WHY SHOULD WE follow Security and Cyber-Security blogs as well, when using Twitter, following some great Cyber-Security experts!?
Well, I will give YOU a question back: WHY should YOU read newspapers? It is as simple as that, WE need the information about WHAT is going on in the world and also WHAT is going on in the Virtual-World as both worlds, the Real-World and the Virtual-World (Internet), are influencing each other!
.
.
===> DON’T forget, in the word ICT is the letter “I“, which means “Information“, use it. <===
WHEN working with any technical device, especially with devices who are connecting to the internet, it is crucial to have some basic knowledge of Cyber-Security! Whether theses devices are mobile (smartphones, iPhone, iPad, Android, tablets…) or desktop units, YOU need to know How To get protected on a maximum and ALSO about WHEN there are NEW threads around, new scams, new updates, new privacy dangers, new security risks, new valuable tips and tricks to stay secure!
Thankfully, there are many experts in the field of Cyber-Security and Education who do this for us and share their knowledge online. SO… By reading those blogs and following ALSO those experts on Social-Media Twitter, YOU will learn slowly but surely about how to stay best protected and also what are the news where YOU need to be aware about! First step is ===> AWARENESS <===.
WE need ALSO to get OUR daily stream of news, YES, I said daily stream of news as the Virtual-World is moving very quickly and WE need to be informed about WHAT is going on. A hard task indeed, BUT a MUST!!! Like everything else it is the beginning who is the most hardest, BUT once used to it it will just become a normal daily task, believe me đ
===> âNothing in life is to be feared. It is only to be understood.â â Marie Curie â <===
===> The roots of education are bitter, but the fruit is sweet. -Aristotle <===
.
So, here below my selection of blogs from Cyber-Security experts, which I believe, are the most valuable ones which YOU should follow. These experts write on a style who is easily to understand and I learned a lot myself from them:
. The above blogs are the blogs which I recommend as it is easy to understand them, that’s the ones I check first to understand as quick as possible what’s going on and to share my new acquired knowledge with others! Of course I use ALSO different OTHER sources for deeper learning, BUT that’s the sources from where one can grab information on the fly… . .
As in a modern world WE use ALSO Social-Media, especially Twitter, I recommend the following people to follow:
Who to follow on Twitter for Cyber-Security? Here is my selection of BEST publications by awarded contributors:
Did You Know: You and your kids could get easily tracked!
.
Check out the video below, please, to understand WHY it is important to remove the EXIF and GPS data of any device who is getting used to take photos!
.
.
.
Keep It Private Till Everything Is Checked In Depth
.
What YOU should know:
Students took photos of parents and sisters, brothers: do THEY agree to that the photos will get published on the internet?
Photos are using the GPS tracking and show WHERE the real location is! THIS is NOT good and the tags should get removed before publishing!
The GPS Tracking of photos SHOULD get disabled first of all in any device, smartphones, iPad, iPhone! SHOW the students (learners) how to do this while following the tips of the below links:
This is the second blog about “Blogging” and in the first one ===> PracTICE: Using Blogs for Critical Thinking and Proactive Thinking <=== WE were talking about WHAT would be the BEST way to introduce the students (learners) to blogging. NOW, lets go for a practical examplewhere the teachers (educators) tell the students (learners) to create a blog on a specific topic. It should be a topic WHERE there will be a lot of engagement from the students and from WHAT they would get a maximum out of ICT SKILLS, creativity, use of the technology (camera, smartphone, photo camera…), Social Media knowledge, communication, Social Learning, preparation knowledge, privacy knowledge (not publishing blog…), working in a team, collaboration…
.
SO… WHAT could that be for a topic? Well, I think that something everybody could do is to write a blog about WHAT any single person makes probably different, ===> WHAT are WE eating at home? <===
Of course, if someone of YOUR students (learners) OR parents don’t WANT and allow to use that topic, leave it FREE to them to chose another topic! Make sure ALSO that the parents sign a paper that they agree with such an action as it goes into PRIVACY!
Other possibilities could be: pet, sport activities, reading (my books…), games (games which I play…), my hobbies (some have more than one hobby…), my friends hobbies… Talk to YOUR responsible psychological person in YOUR school, in case if YOU have kids with problems to find out WHAT could be the BEST way to get THEM also ===> engaged in that learning process… <===
.
OR perhaps about an excursion which YOU made with the students, I recommend to visit my following blog to find out about the possibilities:
Depending in which country and/or state YOU are living, this could cause problems as well because of social status and privacy and certain parents wouldn’t allow such actions (NO one needs to know what’s happening in our family…)… Feel FREE to prepare a form which YOU handle out to the parents to hear THEIR opinion about it and tell THEM that THEIR kids (students, learners) are NOT forced to apply to it and could use another topic as already mentioned above… YOU will NEVER get a 100% agreement, BUT YOU could make the project a worth way to create together a project THAT shows the different ways HOW people THINK and HOW to show THAT it is STILL possible to create a COMMON project WHERE people are working together!
YOU will face the problems of REALITY from the REAL-WORLD by using the possibilities of the VIRTUAL-WORLD and YOU will be able to discuss these problems as well with YOUR students (learners) ===> Critical-Thinking and Proactive-Thinking… <=== Do YOU have this courage!???
Explain THEM also WHY it would be a good idea to agree to that projectbecause of:
Students would work together to exchange about life, about the REAL-WORLD…
Students will learn from each other about different ways of life…
Students will learn how to use their smartphones and how to blog, learning about Social Media, blogging, getting 21st Century skills, how to combine smartphones, tablets, using THEIR creativity, working in a team, how to edit and correct photos for BETTER quality…
Students will learn how to stay private while using blogs, securing their privacy so, because the teacher (educator) WILL FIRST HAVE A LOOK ON IT AND GIVE ADVICE before publishing the final version…
Students will learn to accept each other whatever their social status is…
Students prepare first THEIR own blog and than later a selection of the photos from each student will get used on THE COMMON COMMUNITY BLOG, where the students write also THEIR experience to document it…
…
.
The needed Tools And Services-The Preparation
.
First of all, WE need a FREE blogging service. I recommend WordPress as it is very easy to use and as it allows the students to chose from a variety of templates, so each student could use its own template to show its creativity. Then WE need ALSO an easy to use and a multi-platform (any OS compatible) PHOTO-EDITOR, where I recommend PHOTOSCAPE for Windows users ONLY, and GIMP (Windows, Linux, Mac) see below the links:
Keep It Private Till Everything Is Checked In Depth
.
.
.
As already mentioned above, students blogs should get kept private, WordPress offers this (check left hand screenshot)Â till the teacher(s) checked them in depth to make sure that their isn’t any privacy problem such as:
Students took photos of parents and sisters, brothers: do THEY agree to that the photos will get published on the internet?
Photos are using the GPS tracking and show WHERE the real location is! THIS is NOT good and the tags should get removed before publishing!
Check out the video below, please, to understand WHY it is important to remove the EXIF and GPS data!
.
.
How To Remove The GPS Tracking Of Photos
The GPS Tracking of photos SHOULD get disabled first of all in any device, smartphones, iPad, iPhone! SHOW the students (learners) how to do this while following the tips of the below links:
To make sure for NOT loosing the topic of the created blog(s), I suggest to add at the bottom some reminder, the keywords which explain about WHAT the blog should be and ALSO the guideline for the students (learners), as shown below.
.
===> create blogs private, teacher checks blog & discusses with learners in a group, photos will get later ALL published in one blog as a TEAM blog, blog will get used with other students on a global view, like Skype, global exchange of habits to know each one better, social global approach… <===
.
This blog was created to make YOU THINK, to know about possible problems, to make YOU Critical-THINKing persons and Proactive-THINKing persons, use it as such, please đ
Check my #curation to find best articles, blogs and courses about #education #itsecurity #CyberSecurity #EdCollCoach #GlobalEDU #cyberbullying, #AR #RA #augmentedreality #health #science #QR #qrcodes in EN, FR, DE…
Play the FREE Game and Learn about Cyber Security and Coding
App Advisor
App Advisor helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.
Click image to use this free service and find out of your installed Apps are “privacy-friendly” or check new Apps before installing them!