RSS

Tag Archives: Reflexes

Cyber-Security is easy / Get THE right reflexes!

Cyber-Security is easy / Get THE right reflexes!

.

Learning basics of IT-Security and Cyber-Security

.


Cyber-Security is easy / Get THE right reflexes!

Strange title isn’t it!? I am talking about reflexes, WHAT has THAT to do with Cyber-Security? A lot, actually even THE most when well applied! WE learned already in previous blogs WHY WE need protection ===> Learning the basics of Cyber-Security <=== and ALSO How To get BEST protection with mostly FREE software ===> Cyber-Security Practice: Learn it in one week <===, BUT is THAT enough?

===> NOT everything is automated, so it needs a human interaction, THE missing factor in previous posts which WE will discuss here in this blog. <===

.


1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01

.

===> There is some THEORY below, if YOU don’t want to read it switch to next chapter! BUT, it might be good to take the time one day to learn it as it is important to understand the WHY! <===

FYI: Brown text is THEORY, explications…

.


Let’s first decide what Cyber-Security is!

Chat iconFirst of ALL: let us make one point clear! A Security by 100% doesn’t exist as ===> The weakest link in a security chain is the human! <=== and Nobody Is Perfect! The developed software ALSO is created by humans, so…! BUT, WE can learn to get a maximum of knowledge about Cyber-Security and protection as well, step by step! As more people have THAT knowledge and installed protection on any device and on any OS, as more secure the internet will be!

BUT, let us come back to Cyber-Security in general, WHAT is Cyber-Security? There are so many information on the internet about Cyber-Security, BUT none explains in depth with simple words WHAT it is! A lot of confusion for people who want to learn about it!

In fact it is everything WE should know for avoiding malicious actions WHO can get used to bring in danger a Government, Companies and ALSO private persons! And that is a lot WHO can get brought into that topic and should also be! WE should get used to ONLY one word ===> Cyber-Security <=== where by the following SHOULD be included, as they ALL are related to it, especially ALSO the human behavior:

.


The PracTICE / How To Get The Right Reflexes To Stay Secure?

programmerman-animated

          • First of ALL, check my blog ===> Cyber-Security Practice: Learn it in one week <=== and follow ALL the steps.
          • Chose a day in the week where YOU control YOUR updates and YOUR computers & mobiles security! I suggest the Friday, as I created on Twitter the “Friday Security Check Day“, hashtag = #FSCD. Get used to it on any Friday, get THE reflex!
  • On any second Tuesday on each month Microsoft and Adobe publish new updates, install THEM! THEY are a MUST! It’s the Patch-Tuesday!
  • Introduce a pledge in YOUR family, where every family member MUST sign and accept it! It will give a Community feeling and RESPONSIBILITY!

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

Keywords, necessary for me to create this blog post: Collaboration, parents, teachers, kids, students, learners, weekly reflex, #FSCD, Updates more important than Anti-Virus, Mind-Set-SHIFT, a lot of very quick changes, adapting, Proactive-Thinking, analyzing the facts, brain upgrade and NOT ONLY computer upgrade, How could this be done?, ideas, most malware hosted in…, NSA, Privacy, Cyber-espionage, looking for European hosted cloud services, F-Secure,

.

Stay tuned for next blog post(s) 😉

.

.

 
11 Comments

Posted by on October 27, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Europe, For a Better World, Free courses, Get smart with 5 minutes tutorials, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Project Based Learning, Quality Courses, Reality, Reflexes, Responsibility, Right use of Technology, Secure Surfing, Security in Schools, Social Media, Spam, Stalking, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Tracing, Tutorials, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,