RSS

Tag Archives: Apple Insecurity

ICT Awareness: What YOU SHOULD KNOW!

ICT Awareness: What YOU SHOULD KNOW!

.

.Learning IT-Security

.


.

sid2014-anim-banner

ICT Awareness: What YOU SHOULD KNOW!

.

programmerman2Since 1998 already I am giving FREE courses about IT-Security and Cyber-Security (since 2002 pedagogical ones…) as well as I blog a lot about it and it’s a NEVER ENDING story as the Virtual-World (Internet) is becoming more and more tricky and starting to become a trap for lots of people while surfing in the jungle of information worldwide… SO… There was published a lot about it and most people are worry of such a lot of BIG DATA and don’t know anymore where to START to learn about it! To make it handy for YOU, I will give YOU again a 5 minute small course about it, check below, please… YOU will see WHAT YOU have to take care about to stay secure and then YOU might click the links for a deeper knowledge, don’t fear as it’s easy 😉

===> Education and TEACHers, this is especially for YOU! <===

.

===> “Nothing in life is to be feared. It is only to be understood.” Marie Curie <===

.

programmerman-animatedTHE known issues (there might be some more to get discovered…):

.

The World’s Biggest Data Breaches in One Stunning Visualization

.

Data-Breaches

http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES

The above mentioned are ONLY the most relevant where YOU need to take care about and the blog post will get updated when NEW ones are on the front!

.

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01The above mentioned tools are ALL part in Education and are getting used on a daily base from teachers and students around the world, AND Education doesn’t find it STILL necessary to teach the basics of Cyber-Security up from the early age!??? Did I say, the early age!??? YES, one can teach the kids the reflexes to stay secure up from five (5) years age, see link below:

.

===> In my humble opinion: WHEN NOT teaching the basics of Cyber-Security, I see this as NAIVETY and very close to stupidity! This is visually seen as let people drive a car and they make accidents with it and NOBODY will take its RESPONSIBILITY!!! Excuse-me, please 😩 <===

.

7 Cybersecurity Myths Busted

.

===> PRINT IT OUT and DISPLAY IT in YOUR CLASSROOM!!! <===

.

Read ALSO my daily NEWS:

.


.

GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)
……

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

.

Stay tuned for next free courses and tutorials ;)

.

.

 
21 Comments

Posted by on June 23, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, Education, eLearning, Encryption, Engagement, Environment, Evernote, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Gaming, Geo-Tagging, Get smart with 5 minutes tutorials, HotSpot, HowTo, Ideas for a more secure Internet, Instagram, IT-Security Worksheets, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, JOOMLA, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Motivation, Naivety, Not ONLY rights but also responsibilities, OpenOffice Vulnerabilities, Passwords, PBL, Personal Learning Network (PLN), Phishing, Pinterest dangers, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, SID2014, Skype insecurity, Smart TV's, Social Engineering, Stalking, Students 21st Century Survival Guide, Sustainability, Technology Integration, TOR-Anonymat, Tracing, Tumblr, Tutorials, UBUNTU Forums, vBulletin Forum, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security

Why (And How) Teachers Should Start Learning and Teaching Cyber-Security

Evolution of Education: Wordle Logo

.


What should get be taught and learned more in the 21st Century while using ICT?

.

Learning basics of IT-Security and Cyber-Security


.

sid2014-anim-banner

.

Chatting, talkingBeing online since 1998 and giving courses about ICT more than 10 years the practice and my online excursions show me that IT-Security (basics of Cyber-Security) and Internet-Safety are not yet taught enough. Seriously I think there is a need to talk and teach about existing laws in different countries and show the learners that they have not ONLY rights but also responsibilities; teachers the same for YOU 😉

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===


HOW COULD THAT BE IN PRACTICE???

help-books-aj.svgajash01-1
First of all I recommend you to read some books to understand, I recommend books from Howard GARDNER and Daniel GOLEMAN.
.
  • 5 Minds For The Future (Howard GARDNER)  to understand what the world needs for abilities from students in 21st Century

  • The Disciplinary Mind: the mastery of major schools of thought, including science, mathematics, and history, and of at least one professional craft.
  • The Synthesizing Mind: the ability to integrate ideas from different disciplines or spheres into a coherent whole and to communicate that integration to others.
  • The Creating Mind: the capacity to uncover and clarify new problems, questions and phenomena.
  • The Respectful Mind: awareness of and appreciation for differences among human beings and human groups.
  • The Ethical Mind: fulfillment of one’s responsibilities as a worker and as a citizen.
.

When having read the recommended books YOU will understand much better what are the actions to take and certainly there will be also some new ideas from YOU ;) Read also my blog: 21st Century Learning and Teaching: Multilingual Books Recommendations



Nobody Is Perffect! Any OS Is Vulnerable!


 The facts which you should know and who will make you (hopefully) think, even critical think:

First of all, you should know and realize that any “Operating System” (OS) is vulnerable! Follow the links below to learn more:

There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:

Concerning the Mac, check the Report from, SYMANTEC here:

.

Mac-Insecurity-Threats-Symantec-2012

.

Don’t forget also about mobile phones, Android is also based on Linux as OS! Check here:

.

=> A MUST CHECK for Education is the number of Data-breaches from Schools, Colleges and Universities as well: <=

..

Cyberattacks the greatest threat to nations

A MUST READ!!! ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattacks+the+greatest+threat+to+nat.

.

And this Infographic YOU should really read!!!

.

hacker-target-victim-statistics-infogrphic-e1367241780834

Image credit: http://www.scoop.it/t/securite-pc-et-internet/?tag=Are+you+a+hacker%27s+target%3F+%5Binfographic%5D

.

Phisher pupils hack class computers

.

Chat icon

.

.

A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.

Check for whole story /May03, 2013):

.

.

.


What can be done to turn this around?

.

teacherSeriously and convinced, I think that there is a MUST to teach the basics of Cyber-Security by Education in any schools around in the world, and this up from the early age! The kids will understand it very quickly, they are more intelligent as most adults think as their computers and Smartphones are the (nearly) most important to them! I have worked together with teens (11 years old and +) and showed them How To protect their computers and how to stay informed about new threats, that was a piece of cake for them, I even didn’t think that it could be that easy, I was surprised! Convincing adults is (???) more (very) hard!

So, how could that be in practice? That was the question I asked myself (oh yes, I thought a lot
) and here are my propositions and advice:

Apart from teaching the basics of Cyber-Security in schools by traditional learning, one should try ALSO to involve and engage youth in that process of learning, learning by doing and learning to have responsibility! IT’s ALL about responsibility anyway when working and using ICT (BYOD included)! This could be realized with a piece of theater (it took me a year of development) where they could be involved as actors (players) and also by giving them the feeling of being an IT-Hero by becoming Security-Scouts. Sounds strange? Check the links below to learn more:

.

.

See also below the “Security Incidents By Industry”:

.

Security Incidents by Industry

Image Credit: ComputerWorldUK
.
.

See ALSO Real Time Cyber-Attacks worldwide and THINK!!!

.

Real Time Web Monitor

Check here to go to the website ===> AKAMAI Real Time Web Monitor <===

.

Should I give you more explications? I don’t think so, just go to the website by clicking the above link and try it out! Make some ===> PracTICE  <=== ;)


Malware encounter rate Education April 2013

Check here for more info: ===> SC-MAGAZINE

Check also:

.

FBI-US-Cybersecurity is National Priority

Check here for more info: ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=US-Cybercrime+a+national+security+threat

 .


With Smartphones and tablets WE are ALSO confronted with BYOD!

.

Uneducated employees (Infographic)

Uneducated employees (Infographic)

Click image to go to source and to learn more


.

I created a detailed blog about “Bring Your Own Device” (BYOD) who explains the Dangers, Risks, Policy, Advantages and ALSO Awareness for Cyber-Security on following address (READ IT!):

Read ALSO my “Curation” about it which will get updated as soon as there are some NEWS:

Hint: Don’t know yet what “Curation” is? Check:

.


Internet-Safety and Cyber-Security, Both a MUST!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01
Internet-Safety ALONE isn’t anymore enough to teach in schools! By having read the above and understood it, YOU should admit that Internet-Safety and basic knowledge of Cyber-Security TOGETHER are a MUST to teach in schools!
.
.

.
PS: Give your brain a kick and start thinking on how yourselves can contribute for a more secure Internet, the solutions are described here in this blog 😉
.
===> We are ALL responsible for a more secure Internet! <===

Some wise words:

With realization of one’s own potential and self-confidence in one’s ability, one can build a better world. Dalai Lama

By developing a sense of concern for others’ well-being, then no matter what others’ attitudes are, you can keep inner peace. Dalai Lama

.

.

.

programmerman-animated===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===

.

.

As most are using already (and SHOULD) use Social Media Twitter, here are the BEST Hashtags to stay informed about Cyber-Security:

#CyberSecurity #Security #InfoSec #eCitizen #digcit #DigitalCitizen #InternetSafety

.

When #Teaching Digital Literacy don’t forget 2 integrate ALSO #Learning basics of #CyberSecurity ==> BOTH are a MUST in #21stC in #Education

 
.

.


 School Network Downtime Due to Malware    

Lots of Schools are using BYOD ===> Cyber-Security is a MUST then!


School Network DownTime Due To Malware 2012

When schools, Colleges and Universities are facing a Downtime due to Malware, so are the courses online NOT available, nor can the learners, students access the necessary educational stuff for their learning, communication and sharing! This is a lost of time ===>
.
Under construction…
.
.

EdTech versus ICT?

.
boxer.
.
.
Tonight on April 29, 2013 there will be a Twitter-Chat about this TOPIC which I will (hopefully) follow as it is at 8 pm, which means at 02:00 am in my country and it’s running 1 hour!
.
It looks like there is a big problem between the IT-department in schools and the Teachers as in some institutions Social Media is forbidden and a lot of restrictions to resources are made, which is certainly NOT a big pleasure for the educators, nor for the learners! AND it doesn’t reflect 21st Century Mentality at ALL!
.
.
.
.
.
.
Check the following link, please:
.
.
Hint: What is a Twitter-Chat?
.

Tips for the IT-Admin

.

Chat iconLots of schools don’t have a professional IT-Admin, a person who has learned about IT-Security and who has the necessary skills about IT-Security, so here some Tips at least to give them some help:

..

.

.

My advice: 

.

I created a very easy to follow plan on how schools could make Cyber-Security (IT-Security) much more easy for the IT-Admin when it would get followed; BUT the IT-Admin SHOULD try to make it a REFLEX on any FRIDAY thus to remind people of the Security-Task! That’s why I created on Twitter the #Hashtag ===> #FSCD <=== which means “Friday Security Check Day“!!!

.

Check it out here ===> https://twitter.com/search?q=%23FSCD&src=typd

And here is How-To:

.

.

.
.
.

Infographics, Videos and Curation as a pedagogical help for Learning

.
Over the years I have collected and curated a lot of Infographics and videos about IT-Security, Cyber-Security, Internet-Safety, Online-safety, eSafety, eCitizen, Digital Citizen, Digital CitizenShip which are a great way for learners, students to learn on a very quick way, you may check the resources here:
.
.
.
.

Sharing the good PracTICE

.

Gust MEES

.

.

Me profiting from when I help other people, it is me who gives something and not the other person???” Such may be your thinking, but…There are new ways in Psychology who are describing this very well such as:

.

.


.
When I do something for other people, I feel good, “says Peterson“. When you do something voluntarily for others, not only for its own interests, it is rewarded. In some mysterious way, serve as an “altruistic” (the opposite of selfishness) gives his own life more important. It seems that nature have put it in our genes, or that people are happy when they have the spirit of sharing, community spirit.
.
===> SO, don’t forget please, to share this blog with others! WE are ALL responsible for a more secure Internet! <===
.
.

.

 


Final Word


trafficlightgreendan01

If this blog makes you think and your grey cells are getting activated, so that your filter situated between your two ears (your brain) starts to get more activities as usual, than the author is very happy. Thus meaning that my message(s) made move something. Feel free to leave a constructive message…

.

..

.

.

programmerman-animated

.

===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===

.

.

As most are using already (and SHOULD) use Social Media Twitter, here are the BEST Hashtags to stay informed about Cyber-Security:

#CyberSecurity #Security #InfoSec #eCitizen #digcit #DigitalCitizen #InternetSafety

.

When #Teaching Digital Literacy don’t forget 2 integrate ALSO #Learning basics of #CyberSecurity ==> BOTH are a MUST in #21stC in #Education

Who to follow on Twitter for Cyber-Security? Here is my selection of BEST publications by awarded contributors:
.
 
21st Century Education: The MOST IMPORTANT is an Education about Critical-Thinking and Proactive-Thinking, check below to learn more:
.
 
.

..

.


FeedBack Poll

.

Coming soon… in preparation…

.


..

L’auteur Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.

.

.

.

 
12 Comments

Posted by on December 30, 2012 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apps, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches in Education, Education, eLearning, Encryption, Environment, European Cyber Security Month, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, HowTo, Ideas for a more secure Internet, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, PBL, Personal Learning Network (PLN), PLN, PracTICE, Proactive Thinking, Project Based Learning, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Student Centred, Students 21st Century Survival Guide, Sustainability, Tutorials, Twitter Chat, Visual IT-Security

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

. .

Learning IT-Security

.

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn…

.

.

.

Keywords for this free course:

.

motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

===> Being ignorant is not so much a shame, as being unwilling to learn. <===

Benjamin Franklin

.
.

.

.


WHAT is The Pedagogy Of Education 3.0 And WHY Should WE Embrace It?

To make it very short, WE SHOULD embrace it as “mLEARNing” has more positive aspects as negative ones, please check below…

.

Education 3.0 and the pedagogy of Mobile-Learning

 

Click here to go to the original article ===> http://fr.slideshare.net/jgerst1111/education-30-and-the-pedagogy-of-mobile-learning <===

.

Check also my “Curation” about Mobile-Learning (mLearning):

.


What Teachers + Educators should learn about BYOD

TeacherMost of articles, blogs and Tweets written by educational people are showing the advantages of “Bring Your Own Device” (Hashtag for Twitter = #BYOD) and they embrace very well BYOD, which I do also; but…

.

There are some more things to consider such as:

  • A BYOD Policy in the campus, school…
  • Prepare for BYOD in your organization, thus meaning: training for ALL!
  • MDM: Mobile Device Management
  • Internal IT-Security Infrastructure
  • A special IT-Security Insurance

Read my complete curation about BYOD it here: http://www.scoop.it/t/21st-century-learning-and-teaching?q=BYOD where you will find also best articles and blogs who describe at it best what BYOD is as well as blogs from teachers who explain the benefits for Education…

===> Read and learn also about IT-Security, YES that is a MUST in 21st Century in Education, especially when using BYOD: <===

Learn also about eCitizen, Digital Citizenship where Teachers should stay there as good example and knowing about their responsability:

Responsability as eCitizen (Digital Citizen) for the Government, be a good patriot and know how to defend your Government against Cyber-Attacks and Cyberwar, why and how?

.

.

Principals: did you also think about your Schools, University reputation!? Imagine that there will be a data-breach, the Press would talk about and your reputation then!? You need to get protected by having a strong BYOD-Policy and a strong IT-Security infrastructure, think on that please…

Read more:

.

.

===> The above mentioned must be included in Education and especially when using BYOD, read these blogs and curated articles and you will understand that they are a MUST 😉 <=== 


Suggestions for a good BYOD Policy

.

BYOD

.

..

.

We need to know and to understand first that “Nobody Is Perfect”, no OS (Operating System) is 100% secure and there are vulnerabilities present, which need to get updated asap! This is not ONLY the IT-Admin’s task and responsibility, but our own responsibility!

.

.

Read also:

.

 

 

BYOD is becoming a prevalent Information Security and IT Focus

Image source

..

.

===> There is a need to for a healthy Cyber-Culture, a Cyber-Hygiene introduction for a more secure Internet! Read more: Cyber-Hygiene <===

.


Why our responsibility?

.

Question mark iconThe IT-Admin’s responsibility is to keep secure the School’s Network and to keep it safe from Malware and attacks; if it’s a good IT-Admin with good IT-Security knowledge he will even block infected devices to access the school network, that’s his good right! So imagine that you give courses with BYOD Infrastructure and some devices are infected and the IT-Admin blocks those, your course couldn’t get held as not all of your learners can access the school network, not funny at all that situation, isn’t it?

.

Check the complete slideshow here

My suggestions to prevent this is to organize a weekly security day in school for any class where the learners together with the teachers control their devices for latest updates and antivirus updates to make sure that they all are secure and don’t represent a danger and risks for the school network! Check the image below and read also the complete report from McAfee…

.

Total Mobile Malware Samples in the Database

McAfee Threats Report: Second Quarter 2012 

I suggest also that some teachers with good IT-Security knowledge create a “Security Club” in school where they train the learners about “IT-Security” to become “Security Scouts“, people with good IT-Security knowledge who can help others to stay secure. You will build up a secure community and the “Security Scouts” will be proud about their title and their responsible function. YES, responsibility that’s the right word which needs to get spread! In 21st Century Learning IT-Security and Internet-Safety are a MUST and should get maintained! Give a help to create the new 21st Century Heroes, the “IT-Security Scouts“!

Find below my blogs and other resources on How-To:

.

  1. IT-Security Scouts
  2. 5 minutes tutorials on How-To get smart about IT-Security
  3. BYOD in education–TechNet Jump Start training to help your planning
  4. MDM: Mobile Device Management
  5. 6 Keys To A Flexible MDM Strategy
  6. BYOD-Security-Becomes-a-Pervasive-Issue
  7. Is BYOD a Nightmare for IT-Security
  8. Apple, Mac, iOS4, iPad, iPhone and (in)security…
  9. UK govt encourages insurers to reward good IT security

The Internal Security of the School Network

.

Attention iconText from Higher Education-Data Breach [Start]Institutions of higher learning need to think like businesses AND consider the enormous financial and reputational dangers of a data breach. Unlike many businesses, colleges and universities are under constant attack, from within as well as without. [End]

A School Network has also data bases where the information of the learners are stored and which needs to kept private! Most countries have even laws about Privacy where the head of school could get taken responsible by court for a data breach, thus meaning: the principal would face severe punishment by law if the private data of the school staff and the learners would be made public by a data breach due to no IT-Security Policy in School’s.

Best way is that the Principal and his staff talks together with the IT-Admin on How-To build up best protection, especially when using BYOD, as BYOD could be dangerous and security risks are present in the School NetworkThere is also to consider supplement costs because of new staff for IT-Security and the costs of the whole IT-Security Infrastructure…

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

.

UneducatedEmployees_IG_554

Click image to go to source and to learn more…

.

Read also and stay always informed about news of Cybersecurity:

.


Tips for the IT-Admin

.

Chat iconLot of schools don’t have a professional IT-Admin, a person who has learned about IT-Security and who has the necessary skills about IT-Security, so here some Tips at least to give them some help:

.

.

.


Recommendations

.

sharing iconIt is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!

Parents could help their kids to achieve a weekly security task, reminding them about to do it by rewarding them and also by “punishing” them with a “Task-List“, check my FREE Online Google docs here:

.

Worksheets on Google Docs: 


What did we learn and what we must follow and respect!

..

 WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01

.

        • Automatic Windows Update must be enabled
        • For Apple devices: ALL the updates must be installed also!
        • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
        • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

. 

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next course and tutorial…

.


Search Engine Submission – AddMe

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,