Blog posts about Education, CyberSecurity, Digital Citizenship, Privacy, InternetSafety, curation, PKM, PLN, blogging, Global Collaboration, Coaching, Collaboration, eSkills, eLeadership, Coding, MakerED, MakerSpace, Social Media, How to learn, learning to learn
Before Starting With Coding WE MUST know first the IMPORTANCE and the big RESPONSIBILITY about ===> Coding <===! Responsibility while Coding, sounds STRANGE, isn’t it!?
Well, I think the BEST way to explain YOU WHY ===> Proactive THINKing and RESPONSIBILITY is a MUST <=== in Education, is to show YOU some examples on WHAT happens WHEN code goes wrong!
And WHAT about ===> Copyright!? <=== DON’T FORGET to tell YOUR students, learners, about it as well. The above mentioned is A MUST as it will develop ===> Critical THINKing and Proactive THINKing <===!
SO… NOW as WE discussed about WHAT NOT TO DO, let’s GO for trying out how WE can give courses about ===> Coding <=== 😉
.
Coding Introduction
.
.
Coding is the 21st Century skill. Coding enhances creativity, teaches young people to cooperate, to work together across physical and geographical boundaries and to communicate in a universal language. Technology is part of our life, and coding brings it closer to you!
Check ALSO, click the image below, please, to go to the proposed resources from the “EU“:
.
.
.
Another Initiative In Europe:
.
Click the image to access the website, please.
.
In Europe Five-Year-Old will learn ALREADY about Coding, check article below, please.
.
.Read more (A MUST) by clicking the image.
.
Play The Cyber Security Lab To Learn About Coding AND Cyber Security
.
Click the above image to access the game, please.
.
.
.
.
.
Interesting Kits are ALSO the KANO, check below, please.
.
Click the image to access the full article.
.
Interesting Kits are ALSO the Raspberry PI and Arduino, check below, please:
.
.
Click the image above to access the article, please.
.
.
Click the above image. please, to access the article.
.
Click the above image. please, to access the article.
Well, YOU have the possibility to use Kits without the use of a computer and Software-Kits who run on the computer, as well as special software for the kids and games from where the kids can learn coding.
Let’s START with the Kits,see non-exhaustive list below, please:
Keywords necessary for me to create this blog post: Awareness, Responsibility, Cyber-Security, accidents because of wrong code, naivety, ignorance, wrong self-estimation, selfish, egoism, NO empathy for OTHERS when making a mistake, risks, risk of failure, Privacy, life attitude, ETHICS, moral, Copyright, Commercial ETHICS, FUN-Society,
Why (And How) Teachers Should Start Learning and Teaching Cyber-Security
.
What should get be taught and learned more in the 21st Century while using ICT?
.
…
.
.
Being online since 1998 and giving courses aboutICT more than 10 years the practiceand my online excursions show me that IT-Security (basics of Cyber-Security) and Internet-Safety are not yet taught enough. SeriouslyI think there is a need to talk and teach about existing laws in different countries and show the learners that they have not ONLY rights but also responsibilities; teachers the same for YOU 😉
In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!
The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…
===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===
HOW COULD THAT BE IN PRACTICE???
First of all I recommend you to read some books to understand, I recommend books from Howard GARDNER and Daniel GOLEMAN.
.
5 Minds For The Future (Howard GARDNER) to understand what the world needs for abilities from students in 21st Century…
The Disciplinary Mind: the mastery of major schools of thought, including science, mathematics, and history, and of at least one professional craft.
The Synthesizing Mind: the ability to integrate ideas from different disciplines or spheres into a coherent whole and to communicate that integration to others.
The Creating Mind: the capacity to uncover and clarify new problems, questions and phenomena.
The Respectful Mind: awareness of and appreciation for differences among human beings and human groups.
The Ethical Mind: fulfillment of one’s responsibilities as a worker and as a citizen.
There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:
A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.
Seriously and convinced, I think that there is a MUST to teach the basics of Cyber-Security by Education in any schools around in the world, and this up from the early age! The kids will understand it very quickly, they are more intelligent as most adults think as their computers and Smartphones are the (nearly) most important to them! I have worked together with teens (11 years old and +) and showed them How To protect their computers and how to stay informed about new threats, that was a piece of cake for them, I even didn’t think that it could be that easy, I was surprised! Convincing adults is (???) more (very) hard!
So, how could that be in practice? That was the question I asked myself (oh yes, I thought a lot…) and here are my propositions and advice:
Apart from teaching the basics of Cyber-Security in schoolsby traditional learning, one should try ALSO to involve and engage youth in that process of learning, learning by doing and learning to have responsibility! IT’s ALL about responsibility anyway when working and using ICT (BYOD included)! This could be realized with a piece of theater (it took me a year of development) where they could be involved as actors (players) and also by giving them the feeling of being an IT-Hero by becoming Security-Scouts. Sounds strange? Check the links below to learn more:
I created a detailed blog about “Bring Your Own Device” (BYOD) who explains the Dangers, Risks, Policy, Advantages and ALSO Awareness for Cyber-Security on following address (READ IT!):
Internet-Safety ALONE isn’t anymore enough to teach in schools! By having read the above and understood it, YOU should admit that Internet-Safetyand basic knowledge ofCyber-SecurityTOGETHER are a MUST to teach in schools!
.
.
.
PS: Give your brain a kick and start thinking on how yourselves can contribute for a more secure Internet, the solutions are described here in this blog 😉
.
===> We are ALL responsible for a more secure Internet! <===
Some wise words:
With realization of one’s own potential and self-confidence in one’s ability, one can build a better world. Dalai Lama
By developing a sense of concern for others’ well-being, then no matter what others’ attitudes are, you can keep inner peace. Dalai Lama
.
.
.
===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===
Lots of Schools are using BYOD ===> Cyber-Security is a MUST then!
…
When schools, Colleges and Universities are facing a Downtime due to Malware, so are the courses online NOT available, nor can the learners, students access the necessary educational stuff for their learning, communication and sharing! This is a lost of time ===>
.
Under construction…
.
.
EdTech versus ICT?
.
.
.
.
Tonight on April 29, 2013 there will be a Twitter-Chat about this TOPIC which I will (hopefully) follow as it is at 8 pm, which means at 02:00 am in my country and it’s running 1 hour!
.
It looks like there is a big problem between the IT-department in schools and the Teachers as in some institutions Social Media is forbidden and a lot of restrictions to resources are made, which is certainly NOT a big pleasure for the educators, nor for the learners! AND it doesn’t reflect 21st Century Mentality at ALL!
Lots of schools don’t have a professional IT-Admin, a person who has learned about IT-Security and who has the necessary skills about IT-Security, so here some Tips at least to give them some help:
I created a very easy to follow plan on how schools could make Cyber-Security (IT-Security) much more easy for the IT-Admin when it would get followed; BUT the IT-AdminSHOULD try to make it aREFLEX on any FRIDAYthus to remind people of the Security-Task! That’s why I created on Twitter the #Hashtag ===> #FSCD <=== which means “Friday Security Check Day“!!!
Infographics, Videos and Curation as a pedagogical help for Learning
.
Over the years I have collected and curated a lot of Infographics and videos about IT-Security, Cyber-Security, Internet-Safety, Online-safety, eSafety, eCitizen, Digital Citizen, Digital CitizenShip which are a great way for learners, students to learn on a very quick way, you may check the resources here:
Me profiting from when I help other people, it is me who gives something and not the other person???” Such may be your thinking, but…There are new ways in Psychology who are describing this very well such as:
Barbara FREDRICKSON: Her main work is related to her broaden-and-build theory of positive emotions, which suggests that positive emotions lead to novel, expansive, or exploratory behavior, and that, over time, these actions lead to meaningful, long-term resources such as knowledge and social relationships.
.
When I do something for other people, I feel good, “says Peterson“. When you do something voluntarily for others, not only for its own interests, it is rewarded. In some mysterious way, serve as an “altruistic” (the opposite of selfishness) gives his own life more important. It seems that nature have put it in our genes, or that people are happy when they have the spirit of sharing, community spirit.
.
===> SO, don’t forget please, to share this blog with others! WE are ALL responsible for a more secure Internet! <===
.
.
.
Final Word
If this blog makes you think and your grey cells are getting activated, so that your filter situated between your two ears (your brain) starts to get more activities as usual, than the author is very happy. Thus meaning that my message(s) made move something. Feel free to leave a constructive message…
.
..
.
.
.
===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Read, think, learn and share over Social Media… Security is everyone’s responsibility! We are ALL responsible for the Internet’s future!
.
.
.
===> “Nothing in life is to be feared. It is only to be understood.” Marie Curie <===
KEYWORDS FOR THIS FREE COURSE and what you will learn:
“Knowledge is a treasure, but practice is the key to it.”
.
Basics of Cyber-Security Practice, Proactive Thinking, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===
.
Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.
Learn in one week how to get Best protection/Introduction
.
In previous blogs I have presented already the different security programs who help us to stay secure on Internet and not to infect others in the community because our computer is infected! The text below is just a reminder:
In the real world our car needs some maintenance and technical control to make sure that there is no danger to other participants in traffic (pedestrians and drivers…), so the same in the virtual world. Our computer is the “virtual car” who is driving on the “Data Highway” (Internet), it needs maintenance and especially care about IT-Security and safety…
I will prepare seven (7) different blogs, one for each day of the week so you don’t need a lot of time to spend for installing the programs and to get used to them… These blogs will refer anyway to the already published blogs and/or would be a simple copy with practical advice and you can use them how you would like. One per day or if you have the necessary time, even more, up to you…
.
Learn in one week how to get Best protection-The Practice
.
I will divide the tasks through a whole week, so it will be very easy for you to find the necessary time to achieve them, those who have the necessary time can, of course, achieve more tasks…
Installing WOT + McAfee SiteAdvisor for knowing which websites are trustful and which ones are malicious! “WOT” ALONE isn’t enough! My experience over years 😉
Use BitDefender QuickScan and scan your computer! Find out if your computer is clean. It only takes a few seconds.Install Secunia Personal Software Inspector, which is checking and automating updates of Third Party Programs.
Sunday: Use the Sunday for a relax check if everything is OK! It takes ONLY 5 minutes. Use the “Security Score” Software to check if everything is OK! 5 minutes ONLY!
.
As you can see in the table “Necessary Time”, most actions need ONLY 5-10 minutes! Eaaaaaaaasy to follow and to use, what are you waiting for!? 😉
.
For those who have the necessary time: I suggest to you to install first the FREE program “Security Score” (for WINDOWS ONLY) and start to check after your Tuesday-Task and after any days task to see the evolution of your security score! This will probably make you more confident and you certainly will try to reach a better “Security Score”, this for your motivation… Try it out:
.
.
Protect your Smartphone and be aware of malicious QR-Codes
As it is impossible to see ONLY by viewing the QR-Code to detect if it redirects to an infected website, it is a MUST to install a QR-Reader who controls before sending you to the website! I recommend:
For Apple devices: ALL the updates must be installed also!
Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)?Knowing that third party programs also are vulnerable, we must also update them! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
While using “BYOD” we need a strong “BYOD-Policy” at least!
While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
It is recommended to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.
===> I created a new Hashtag: #FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===
.
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
.
. Stay tuned for next free courses and tutorials 😉 .
Read, think, learn and share over Social Media… Security is everyone’s responsibility! We are ALL responsible for Internet’s future!
.
===> “Nothing in life is to be feared. It is only to be understood.” Marie Curie <===
Cyber-Hygiene: Hygiene for ICT in Education and Business, sounds strange isn’t it? I will tell you about what it is, try to convince you why we should use it and getting used to it, it’s similar as Hygiene in real world…
Cyber-Hygiene: ICT Hygiene for Population, Education and Business
. Click image to enlarge for best view and click here for the link to the PANDA report [pdf]
.
KEYWORDS FOR THIS FREE COURSE and what you will learn:
.
Proactive Thinking, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===
.
Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.
We need to compare real world with virtual world to understand
.
When we talk about Hygiene in real life we mean taking our daily shower or bath, washing often enough the hands, brushing the teeth minimum twice a day and we must talk also about health; thus meaning: visiting the doctor regularly to avoid serious problems, especially up from a certain age… Hygiene means taking care of our body to have best health and also the responsibility not to infect other people because of bad hygiene and bad health! We need also to be informed about how to stay health by following hygiene tips provided by Education and also by the “Health Ministry”, where we find folders on different places and in 21st Century also now on Internet… We get also taught on practices which are dangerous… That’s the awareness about…
In real world our car needs some maintenance and technical control to make sure that there is no danger for other participants in traffic (pedestrians and drivers…), so the same in virtual world. Our computer is the “virtual car” who is driving on the “Data Highway” (Internet), it needs maintenance and especially care about IT-Security and safety…
So, when working with a computer and “BYOD” (Bring Your Own Device), where “BYOD” is not only computers but also tablets and smartphones, we need to take care of them, whatever “Operating System” (OS) is installed! Otherwise if these devices don’t have the right maintenance and the right “Hygiene” they could infect other Internet users; whereby “Cyber-Hygiene” means here:
Having installed the last updates of the “OS” (Microsoft Windows updates, Mac updates, Linux updates and others…)
Having installed a firewall and an antivirus on any device (ALL OS…)
Being protected against “Third Party Applications” by updating ALL other installed programs on the computer
Being protected on your smartphones with at least an antivirus for whichever “OS” (Android, iPhone, Windows Phone…) See non exhaustive list of protection (not sponsored) below:
Mikko Hypponen: Fighting viruses, defending the net
.
.
National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOV An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.
We need to build up a Cyber-Hygiene Culture/How-To
.
We need to build up a Cyber-Hygiene Culture for a more secure Internet and in this culture we are ALL involved as Internet is a global Network and we could help a lot by using the “Social Medias” to this by sharing our good practices with others…
.
.
Learn more about “Social Media and its Influence” here: .
This Cyber-Culture-Hygiene could get build up by the already mentioned propositions in this blog and also from IT-Security Experts and people with very good knowledge about IT-Security on an volunteer-base as I did and still will doing as described in my following blog:
The above Infographic is only an estimation, but I agree with it that Cyber-Crime will become more important as already NOW TV’s with mini-computer have vulnerabilitieshttp://www.scoop.it/t/securite-pc-et-internet?tag=TV, the rest you could imagine yourself! You should think also on the raise of “Bring Your Own Device” (Hashtag = #BYOD), so there are more and more people using their own devices on work, devices who could represent a danger and risks for the Network the are connecting to if not well secured; switch on your Critical-Thinking please! We need a Proactive-Thinking!
Don’t forget that a security by 100% doesn’t exist and that in the future any fridge, TV, and other technical domestic device will include a mini-computer who can connect to Internet! And any mini-computer is vulnerable… By knowing NOW the facts we see the reality, we are well informed NOW and our Critical Thinking should make us understand that Cyber-Hygiene is a MUST!
We need new ideas how this Cyber-Hygiene-Culture could get build up
.
Some say that it is very difficult to build up a Cyber-Hygiene-Culture and they are right with it because persons need first to understand the “invisible threats” and “attacks” which are present! I invite you to read my “curation” about it here:
.
Curation (selected quality aggregation) about the reality on Internet of the dangers and what happened already, such as Cyber-Security, Cyber-War, Cyber-warfare, Cyber-Crime…
By having read these articles you will be able to understand the risks by using your critical thinking and you will be able to understand also why it is necessary toteach and to use a “Cyber-Hygiene” and also to share your new acquiredknowledge with others…
.
Concerning new ideas, I share already since 2003-2004 a lot of ideas on How-To a “Cyber-Hygiene” could get used, please check here:
Is this “Cyber-Hygiene” advice only a help for Education?
.
As already mentioned above and in the title of this blog, not ONLY for Education, but also for business and of course more then ever NOW also for the whole population as the majority of people around the world are using Internet and that in the future there will be morepeople using Internet and this certainly more with smartphones than with computers!!!
.
.
.
.
.
Any device connected to Internet needs to get protected, so also smartphones! Check also some FREE Apps here:
How could Cyber-Hygiene get introduced to Business?
.
I suggest that the IT-Admin of each company organizes meetings with the companies staff where he and the managers explain to the staff the dangers of “BYOD” and “BYOT” and that the technical staff elaborates also a strong “User-Policy” whereby any employee needs to check his device on the end of the week for updates and security updates! This event will take only between 15 min-30 minutes and should be a MUST! IT-Admin could block access to devices who are not conform to those mentioned Policy! Employees will so not only get used to IT-Security and Awareness on work, but will know so also the reflexes for at home in private life and by knowing these reflexes they will certainly also tell their children at home as well and probably also their acquaintances…
An article from Forbes (7/14/2012) that you must read: “The threat is serious, and the time to prepare for it is now. The increasingly sophisticated tools to change the world are in everyone’s hands as new technologies are introduced, but they are in the hands of criminals.” It’s the wild west in this new technological frontier and we will see who outsmarts whom.
Goodman’s big idea is to have ordinary citizens around the world leverage these very same technologies for good, and to play a more prominent role in maintaining the safety and security of themselves and other citizens.
What did we learn and what we MUST learn for a more secure Internet
.
.
WHAT YOU MUST KNOW!
.
We are ALL responsible for a secure Internet!
Automatic Windows Update must be enabled
For Apple devices: ALL the updates must be installed also!
Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)?Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
While using “BYOD” we need a strong “BYOD-Policy” at least!
While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.
===> I created a new Hashtag: #FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===
.
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
.
.Stay tuned for next free courses and tutorials 😉 .
Check my #curation to find best articles, blogs and courses about #education #itsecurity #CyberSecurity #EdCollCoach #GlobalEDU #cyberbullying, #AR #RA #augmentedreality #health #science #QR #qrcodes in EN, FR, DE…
Play the FREE Game and Learn about Cyber Security and Coding
App Advisor
App Advisor helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.
Click image to use this free service and find out of your installed Apps are “privacy-friendly” or check new Apps before installing them!
RT @Reuters: The U.S. Senate passed a $430 billion bill intended to fight climate change, lower drug prices and raise some corporate taxes,… 1 hour ago
RT @Forbes: Not only is Earth suddenly spinning faster, but our Sun is getting more active than NASA predicted. trib.al/slA6fyc htt… 3 hours ago
RT @lessentiel: 🇺🇸 Ce plan, de plus de 430 milliards de dollars d’investissements, prend la route de la Chambre des représentants pour un v… 3 hours ago