RSS

Tag Archives: responsibility

SID2019: Safer Internet Day 2019-Participation

SID2019: Safer Internet Day 2019-Participation

.

.


Safer Internet Day 2019 – Save the date!.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2019 will be celebrated on Tuesday 05 February 2019, with the strapline of ===> “Together for a better internet” <=== following the success of last year’s campaign.

.

Check the video below, please, who explains about it.

.

 

Learning IT-Security


My participation for the SID2019

programmerman-animatedWHAT is special this year with my participation on SID2019? 

I created a ===> #GlobalCollaboration #blog in 2017 <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitiZENship <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitiZENship (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from AustraliaUSAFranceLuxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2019 in Luxembourg/Europe.

.

 

sid2019-activities-luxembourg-gust mees

Click image, please, to access the article

 


Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2019 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2019 on their blogsand/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2019 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.
Stay tuned for next blog post(s) 😉

.

.

.

.

 

 
Leave a comment

Posted by on January 25, 2019 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Advisory Board, Analyzing, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Collaborative Learning, Collective Intelligence, Competency, Connected Educators, Critical Thinking, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, DDoS, Device Theft, Digital CitizenShip, Digital Footprint, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, eLeadership, eLearning, Encryption, eSkills, Europe, For a Better World, Free courses, Future Work Skills, Get smart with 5 minutes tutorials, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Luxembourg, Luxembourg and CyberSecurity, Mobile Botnet, Mobile Security, Modern EDU, Not ONLY rights but also responsibilities, Often Asked Questions, Open Mind, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Safer Internet day 2019, Secure Surfing, Security in Schools, SID2019, Skills, Social Engineering, Social Media, Students 21st Century Survival Guide, Synthesizing Mind, Teacherpreneurs, Third Party Applications, understanding, Understanding the internet, Vulnerabilities, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Critical Thinking AND Proactive Thinking a MUST in Modern-EDU!

Critical Thinking AND Proactive Thinking a MUST in Modern-EDU!

.

Evolution of Education: Wordle Logo

.


Critical Thinking AND Proactive Thinking a MUST in Modern-EDU! WHY!?

Looks to me as WE will live THE same as in 50’s-60’s with “James DEAN“, Living on the edge Youth & Society“, overload of information!? Change? At that time period it was TV, NOW it’s the internet, similarities? Well, I think so!! A NEW media showed up, the internet, and with the internet ALSO Social-Media. MOST of people are just consumers and DON’T see the dangers NOR do THEY accept THEM!! It’s a Virtual-World which THEY can’t imagine about HOW it will have an impact on Real-World!! BOTH, the Virtual-World and the Real-World are influencing each other!

.

critical-thinking_ENG2

WE are facing actually (2017) “Fake News“, MOST coming and being sponsored by politics interests!!! Just follow “Donald TRUMP’s election campaign and his actually acting…” and YOU will understand WHAT is going on! I encourage YOU to go for “Deep-THINKing” about WHAT is happening in Virtual-World THAT will influence the Real-World!!!

Knowing THIS, you certainly agree with me that there is a MUST to learn about “Critical THINKing, but HOW!?? Please read my curation articles below:

 

Read also the article below, please:

.

Radical Pedagogy: Education has the power to change social inequality by nurturing a generation with an educated mistrust of everything that has been indoctrinated before. This educational stance is one that we must all strive for as the moral purpose of education.

.


And WHAT about Proactive-Thinking?

Teaching, the profession that creates all other professionsProactive-Thinking SHOULD be burned in into EVERY Educators, Teachers MIND! WHY!??? The MOST IMPORTANT for any education related persons should be THEIR students, learners and the how to to prepare THEM for THEIR future!!

THIS Proactive-Thinking results in getting informed about WHAT is the need from the workforce, industry etc. to make sure that the future workers, employees… will be able to help the country to stay competitive with well educated persons! Especially for NEW jobs who will be created because of ICT, where nearly no one knows WHAT those jobs could be!!

Therefore it is very important that Educators, Teachers focus THEIR Professional Development first on the skills that students, learners need to have!

Read my blog post, below please:

 

ICT RESPONSIBILITY

 

 

 

AND as WE are working with ICT, it is MANDATORY that WE will have knowledge about Cyber Security to protect at its BEST OUR students, learners and THAT WE forward OUR knowledge to THEM!

 

 

 

 

Please read my blog post below:

WHY is Proactive-Thinking IMPORTANT and a MUST in Modern-Education with and about ICT!?

.


Proactive-Thinking is ALSO a MUST in Makerspaces and MakerEd

To ensure the safety of OUR students, learners, WE MUST be informed about Safety-Rules when working with different tools and the possible dangers of those tools!!

Please read also my blog post below:

 

And as usually, I remind YOU about the “Synthesizing Mind“!

 

Synthesizing Mind-5 Minds for the future

 

Keywords for me to create this blog post: Actual Politics (Turkey, USA…), Cyber-Security, Bullying, Cyber-Bullying, Social Media, behavior, IS, Society, liberal thinking, NO LIMITS, living on the edge, understanding, overload of information?, FAKE NEWS,

 


 

GUST-AVRIL2014-800px-2.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

Stay tuned for next blog post(s) 😉

.

.

 

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

A Holistic View Of WHAT Will Influence EDUcation In The Future

A Holistic View Of WHAT Will Influence EDUcation In The Future

.

Evolution of Education: Wordle Logo

.


WHAT Will Influence EDUcation In The Future?

programmerman-animatedThrough ICT the Real-World and especially the Virtual-World (both are influencing each other…) are changing quicker then WE can learn about, BUT WE must adapt to it and so must EDUcation! Therefore Universities must do research about the How-To to adapt and teaching about it… Luxembourg, a small country in Europe is doing so in September 2016, read more:

Luxembourg has already a “strategy to promote media literacy” as I got told in an interview, see image below please and click on the image to access the article.

.

Digital 4 EDUcation-Luxembourg-2015-2

Click the image please to access the article.

.

There is ALSO Finland WHO made a radical change to its EDUcation-Sytem, check below please: Finland uses <===> Phenomenon based learning

Meanwhile, before research finishes its studies, WE can already have a look on WHAT is NEW in Technology and WHAT probably would be of interest for EDUcation, as well as NEW Pedagogy Theories and NEW Trends:

.

DQ

 

.

Synthesizing Mind-5 Minds for the future

.

.

.

There will be a focus on Creativity as it was neglected too long in schools.

Because of the internet and Social Media there is NOW ALSO a new way of learning through collaboration, Global Collaboration, Peer-To-Peer Learning, mentoring, coaching:

AND as there is a global change in the way of HOW WE think about EDUcation, there are NOW ALSO <===> #TEACHerPreneurs:

There are ALSO drones and robots which could get easily integrated into Makerspaces and/or labs:

.

Blockchain

Click the image please to access the article.

.

WHEN WE talk about “Entrepreneurship“, then WE MUST ALSO talking about “Blockchain and Bitcoin” as THEY are a Game-Changer in the future, check below please:

AND as WE are using ICT: internet with iPad, tablet, smartphones, laptops, PCs, Macs, small computers such as Arduino, Raspberry PI and Co, the “Internet of Things” WE MUST ALSO have basics knowledge of “CyberSecurity“, check below please:

.

.

WE need ALSO to know about “Privacy“, “Digital Footprint” and “BIG DATA“, check below please:

 

In Europe, from the EU, there is already a manifesto for ModernEDU (eSkills), check below please:

 

And shouldn’t WE talk ALSO about “AI”, Artificial Intelligence? 

 

And last but not least Apps. I put Apps on the END of this list as Apps are ONLY facilitators, it is Pedagogy FIRST! 

.


With ALL the above mentioned possibilities, how can WE already NOW make a concept of LEARNing?

NO Framing in EDUcationWith ALL the above mentioned possibilities, how can WE already NOW make a concept of LEARNing? Please check my blog post below:

.

What is nearly for sure is THAT most courses will be PracTICE orientated, check my blog posts below, please:

And here WHAT probably will be the future, check below please:

.

Design Principles for Professional Learning

Click the above image please to access the article.

.

How can WE get informed more about!? I advice YOU to read following (multilingual) books and to follow the mentioned persons below:

MUST read books to understand WHAT #ModernEDU is, see PIC below please.

.

MUST READ BOOKS

.

.

.

Framing in EDUcationMY experience described in ONLY some phrases: Give the LEARNers, students (whatever age) the freedom of LEARNing without squeezing THEM into a FRAME and concentrate on guiding them as a coach by analyzing THEIR behavior and show them the How-To to become self-directed learners, autodidacts. SHOW THEM ALSO up from the beginning WHAT THE <===> LEARNing Path <===> will be with design of it and explain THEM that they could design themselves it with a short introduction on the How-To. THEY will learn the ICT-PracTICE which will help them once out of the <===> #SchoolCocoon <===> to be ready for Life-Long LEARNing and to be able to adapt very quickly in the workforce! WHEN YOU show the LEARNers, students <===> WHAT the profit is for THEIR private life <===> YOU will engage them very quickly 😉 AND DON’T teach THEM more as necessary, propose them some links to go further ONLY for those who want!!

.

WHAT’S my message and WHY did I create this blog post!?

Well, I will encourage all youth and also adults, seniors, oldies to become <===>Life-Long LEARNers <===> and staying Up-To-Date with their knowledge, especially concerning their skills in ICT, called NOW <===> #eSkills <===>! In the modern world YOU will change YOUR job probably +/- 12 times in YOUR working career, it is very rare to stay life-long in the same job and/or same company!!! SO… The workforce is looking for people with ICT skills which YOU mostly didn’t learn at school, right!? 

YOU won’t have (mostly) the time to learn by visiting courses, right!? START to become Life-Long LEARNers by LEARNing on YOUR OWN pace, by becoming <===> Autodidacts <===> Self-Directed LEARNers. YOU are able to, I did it, so can YOU!? 😉

I found a job because of my ICT eSkills and I am STILL LEARNing on a daily base routine for being Up-To Date with my <===> Professional Development <===>, even being retired NOW! THE pleasure of LEARNing!

I did THE <===> ICT PracTICE <===> and THAT’S WHAT the workforce needs!!!


 Due to my eSkills I could share my knowledge AND expertise ALSO with the below mentioned as well as to a broad range of visitors from around the globe! 

Check out my blog posts:

AND check my profile below as well, at the bottom of this blog post please! 😉

 

.

Keywords necessary for me to create this blog post: Augmented Reality. #AR, Virtual Reality, #VR, Gaming, Coding, #MakerED, Personalized Learning, Coaching, Instructional Coaching, Teacherpreneur, Enterpreneurship, Problem based Learning, #PBL, Social Media, Twitter, Blogs, blogging, Curation, Google Hangouts, Apps as facilitators, NEW Pedagogy, Critical Thinking, Proactive Thinking, Cyber-Security, ICT related, Quality, Team Teaching, Team Learning, Collaboration, Global Collaboration, sharing, Learning To Learn, preparation for Life-Long Learning, Professional Learning Networks, Professional Knowledge Management, Parents involved in EDUcation of kids, MORE communication, SchoolCocoon will be MORE open, nearly everything will get taught through the use of ICT, #eSkills, Competency based learning, Blended learning, Pedagogy & #EdTech, Mindmaps, ThingLink, Infographics, Apps as facilitators,

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog post(s) 😉

.

.

.

 

 
Leave a comment

Posted by on May 19, 2016 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, AI, Analyzing, Andragogy, Annotum-Theme, Apps, Arduino, Artificial Intelligence, Autodidact, Awareness, BEE CREATIVE, Better Learning, Better Learning about ICT, Better Teaching, Big Data, Bitcoin, Blockchain, Blog creation, Blogs, Books, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), BYOD, Coaching, Collaboration, Collaborative Learning, Collective Intelligence, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Criticism, Curation, Curriculum, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Design Learning, Differentiated Instruction, Digital CitizenShip, Digital Footprint, Digital Intelligence, DQ, Drones, Education, Education 4.0, eLeadership, eLearning, Emotional Intelligence, Engagement, Entrepreneurship, EQ, eSkills, Ethical Mind, ethics, Europe, Facebook, FAQ, Flipped Classroom, Flipped Learning, Free courses, FREE-courses, Future Work Skills, Games, Gamification, Gaming, Global Collaboration, Holistic view of EDUcation in the future, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Innovation, Internet Of Things, Interviews, IoT, itsecurity, Key Instructors, Learn with books, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning Theories, Learning to Learn, Luxembourg, MakerSpace, Mindmaps, Mobile Botnet, Mobile Security, Modern EDU, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, Personal Learning Network (PLN), Personalized Learning, Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Project Based Learning, Quality Courses, Raspberry PI, Reality, Reflecting, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Robotics, Secure Surfing, Security in Schools, Self-directed Learning, Social Media, Student Centred, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Teacherpreneurs, Technology Integration, Twitter, Twitter Chat, Understanding the internet, Updates, Virtual Reality, Visual IT-Security, VR, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security

Why (And How) Teachers Should Start Learning and Teaching Cyber-Security

Evolution of Education: Wordle Logo

.


What should get be taught and learned more in the 21st Century while using ICT?

.

Learning basics of IT-Security and Cyber-Security


.

sid2014-anim-banner

.

Chatting, talkingBeing online since 1998 and giving courses about ICT more than 10 years the practice and my online excursions show me that IT-Security (basics of Cyber-Security) and Internet-Safety are not yet taught enough. Seriously I think there is a need to talk and teach about existing laws in different countries and show the learners that they have not ONLY rights but also responsibilities; teachers the same for YOU 😉

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===


HOW COULD THAT BE IN PRACTICE???

help-books-aj.svgajash01-1
First of all I recommend you to read some books to understand, I recommend books from Howard GARDNER and Daniel GOLEMAN.
.
  • 5 Minds For The Future (Howard GARDNER)  to understand what the world needs for abilities from students in 21st Century
  • The Disciplinary Mind: the mastery of major schools of thought, including science, mathematics, and history, and of at least one professional craft.
  • The Synthesizing Mind: the ability to integrate ideas from different disciplines or spheres into a coherent whole and to communicate that integration to others.
  • The Creating Mind: the capacity to uncover and clarify new problems, questions and phenomena.
  • The Respectful Mind: awareness of and appreciation for differences among human beings and human groups.
  • The Ethical Mind: fulfillment of one’s responsibilities as a worker and as a citizen.
.

When having read the recommended books YOU will understand much better what are the actions to take and certainly there will be also some new ideas from YOU ;) Read also my blog: 21st Century Learning and Teaching: Multilingual Books Recommendations



Nobody Is Perffect! Any OS Is Vulnerable!


 The facts which you should know and who will make you (hopefully) think, even critical think:

First of all, you should know and realize that any “Operating System” (OS) is vulnerable! Follow the links below to learn more:

There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:

Concerning the Mac, check the Report from, SYMANTEC here:

.

Mac-Insecurity-Threats-Symantec-2012

.

Don’t forget also about mobile phones, Android is also based on Linux as OS! Check here:

.

=> A MUST CHECK for Education is the number of Data-breaches from Schools, Colleges and Universities as well: <=

..

Cyberattacks the greatest threat to nations

A MUST READ!!! ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattacks+the+greatest+threat+to+nat.

.

And this Infographic YOU should really read!!!

.

hacker-target-victim-statistics-infogrphic-e1367241780834

Image credit: http://www.scoop.it/t/securite-pc-et-internet/?tag=Are+you+a+hacker%27s+target%3F+%5Binfographic%5D

.

Phisher pupils hack class computers

.

Chat icon

.

.

A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.

Check for whole story /May03, 2013):

.

.

.


What can be done to turn this around?

.

teacherSeriously and convinced, I think that there is a MUST to teach the basics of Cyber-Security by Education in any schools around in the world, and this up from the early age! The kids will understand it very quickly, they are more intelligent as most adults think as their computers and Smartphones are the (nearly) most important to them! I have worked together with teens (11 years old and +) and showed them How To protect their computers and how to stay informed about new threats, that was a piece of cake for them, I even didn’t think that it could be that easy, I was surprised! Convincing adults is (???) more (very) hard!

So, how could that be in practice? That was the question I asked myself (oh yes, I thought a lot…) and here are my propositions and advice:

Apart from teaching the basics of Cyber-Security in schools by traditional learning, one should try ALSO to involve and engage youth in that process of learning, learning by doing and learning to have responsibility! IT’s ALL about responsibility anyway when working and using ICT (BYOD included)! This could be realized with a piece of theater (it took me a year of development) where they could be involved as actors (players) and also by giving them the feeling of being an IT-Hero by becoming Security-Scouts. Sounds strange? Check the links below to learn more:

.

.

See also below the “Security Incidents By Industry”:

.

Security Incidents by Industry

Image Credit: ComputerWorldUK
.
.

See ALSO Real Time Cyber-Attacks worldwide and THINK!!!

.

Real Time Web Monitor

Check here to go to the website ===> AKAMAI Real Time Web Monitor <===

.

Should I give you more explications? I don’t think so, just go to the website by clicking the above link and try it out! Make some ===> PracTICE  <=== ;)


Malware encounter rate Education April 2013

Check here for more info: ===> SC-MAGAZINE

Check also:

.

FBI-US-Cybersecurity is National Priority

Check here for more info: ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=US-Cybercrime+a+national+security+threat

 .


With Smartphones and tablets WE are ALSO confronted with BYOD!

.

Uneducated employees (Infographic)

Uneducated employees (Infographic)

Click image to go to source and to learn more…

.

I created a detailed blog about “Bring Your Own Device” (BYOD) who explains the Dangers, Risks, Policy, Advantages and ALSO Awareness for Cyber-Security on following address (READ IT!):

Read ALSO my “Curation” about it which will get updated as soon as there are some NEWS:

Hint: Don’t know yet what “Curation” is? Check:

.


Internet-Safety and Cyber-Security, Both a MUST!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01
Internet-Safety ALONE isn’t anymore enough to teach in schools! By having read the above and understood it, YOU should admit that Internet-Safety and basic knowledge of Cyber-Security TOGETHER are a MUST to teach in schools!
.
.

.
PS: Give your brain a kick and start thinking on how yourselves can contribute for a more secure Internet, the solutions are described here in this blog 😉
.
===> We are ALL responsible for a more secure Internet! <===

Some wise words:

With realization of one’s own potential and self-confidence in one’s ability, one can build a better world. Dalai Lama

By developing a sense of concern for others’ well-being, then no matter what others’ attitudes are, you can keep inner peace. Dalai Lama

.

.

.

programmerman-animated===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===

.

.

As most are using already (and SHOULD) use Social Media Twitter, here are the BEST Hashtags to stay informed about Cyber-Security:

#CyberSecurity #Security #InfoSec #eCitizen #digcit #DigitalCitizen #InternetSafety

.

When #Teaching Digital Literacy don’t forget 2 integrate ALSO #Learning basics of #CyberSecurity ==> BOTH are a MUST in #21stC in #Education

 
.

.


 School Network Downtime Due to Malware    

Lots of Schools are using BYOD ===> Cyber-Security is a MUST then!


School Network DownTime Due To Malware 2012

When schools, Colleges and Universities are facing a Downtime due to Malware, so are the courses online NOT available, nor can the learners, students access the necessary educational stuff for their learning, communication and sharing! This is a lost of time ===>
.
Under construction…
.
.

EdTech versus ICT?

.
boxer.
.
.
Tonight on April 29, 2013 there will be a Twitter-Chat about this TOPIC which I will (hopefully) follow as it is at 8 pm, which means at 02:00 am in my country and it’s running 1 hour!
.
It looks like there is a big problem between the IT-department in schools and the Teachers as in some institutions Social Media is forbidden and a lot of restrictions to resources are made, which is certainly NOT a big pleasure for the educators, nor for the learners! AND it doesn’t reflect 21st Century Mentality at ALL!
.
.
.
.
.
.
Check the following link, please:
.
.
Hint: What is a Twitter-Chat?
.

Tips for the IT-Admin

.

Chat iconLots of schools don’t have a professional IT-Admin, a person who has learned about IT-Security and who has the necessary skills about IT-Security, so here some Tips at least to give them some help:

..

.

.

My advice: 

.

I created a very easy to follow plan on how schools could make Cyber-Security (IT-Security) much more easy for the IT-Admin when it would get followed; BUT the IT-Admin SHOULD try to make it a REFLEX on any FRIDAY thus to remind people of the Security-Task! That’s why I created on Twitter the #Hashtag ===> #FSCD <=== which means “Friday Security Check Day“!!!

.

Check it out here ===> https://twitter.com/search?q=%23FSCD&src=typd

And here is How-To:

.

.

.
.
.

Infographics, Videos and Curation as a pedagogical help for Learning

.
Over the years I have collected and curated a lot of Infographics and videos about IT-Security, Cyber-Security, Internet-Safety, Online-safety, eSafety, eCitizen, Digital Citizen, Digital CitizenShip which are a great way for learners, students to learn on a very quick way, you may check the resources here:
.
.
.
.

Sharing the good PracTICE

.

Gust MEES

.

.

Me profiting from when I help other people, it is me who gives something and not the other person???” Such may be your thinking, but…There are new ways in Psychology who are describing this very well such as:

.

.


.
When I do something for other people, I feel good, “says Peterson“. When you do something voluntarily for others, not only for its own interests, it is rewarded. In some mysterious way, serve as an “altruistic” (the opposite of selfishness) gives his own life more important. It seems that nature have put it in our genes, or that people are happy when they have the spirit of sharing, community spirit.
.
===> SO, don’t forget please, to share this blog with others! WE are ALL responsible for a more secure Internet! <===
.
.

.

 


Final Word


trafficlightgreendan01

If this blog makes you think and your grey cells are getting activated, so that your filter situated between your two ears (your brain) starts to get more activities as usual, than the author is very happy. Thus meaning that my message(s) made move something. Feel free to leave a constructive message…

.

..

.

.

programmerman-animated

.

===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===

.

.

As most are using already (and SHOULD) use Social Media Twitter, here are the BEST Hashtags to stay informed about Cyber-Security:

#CyberSecurity #Security #InfoSec #eCitizen #digcit #DigitalCitizen #InternetSafety

.

When #Teaching Digital Literacy don’t forget 2 integrate ALSO #Learning basics of #CyberSecurity ==> BOTH are a MUST in #21stC in #Education

Who to follow on Twitter for Cyber-Security? Here is my selection of BEST publications by awarded contributors:
.
 
21st Century Education: The MOST IMPORTANT is an Education about Critical-Thinking and Proactive-Thinking, check below to learn more:
.
 
.

..

.


FeedBack Poll

.

Coming soon… in preparation…

.


..

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.

.

.

.

 
12 Comments

Posted by on December 30, 2012 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apps, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches in Education, Education, eLearning, Encryption, Environment, European Cyber Security Month, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, HowTo, Ideas for a more secure Internet, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, PBL, Personal Learning Network (PLN), PLN, PracTICE, Proactive Thinking, Project Based Learning, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Student Centred, Students 21st Century Survival Guide, Sustainability, Tutorials, Twitter Chat, Visual IT-Security

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber-Security Practice: Learn it in one week

Cyber-Security Practice: Learn it in one week

.

Learning IT-Security

.

Read, think, learn and share over Social Media… Security is everyone’s responsibility! We are ALL responsible for the Internet’s future!


PageRank Checking Icon

.


.

sid2014-anim-banner

.

===> “Nothing in life is to be feared. It is only to be understood.” Marie Curie <===


KEYWORDS FOR THIS FREE COURSE and what you will learn:

“Knowledge is a treasure, but practice is the key to it.”

.

Basics of Cyber-Security Practice, Proactive Thinking, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

. .


Learn in one week how to get Best protection/Introduction

.

vdujwtjyx3uq-252anv-p2pnicubuculei01In previous blogs I have presented already the different security programs who help us to stay secure on Internet and not to infect others in the community because our computer is infected! The text below is just a reminder:

In the real world our car needs some maintenance and technical control to make sure that there is no danger to other participants in traffic (pedestrians and drivers…), so the same in the virtual world. Our computer is the “virtual car” who is driving on the “Data Highway” (Internet), it needs maintenance and especially care about IT-Security and safety

I will prepare seven (7) different blogs, one for each day of the week so you don’t need a lot of time to spend for installing the programs and to get used to them… These blogs will refer anyway to the already published blogs and/or would be a simple copy with practical advice and you can use them how you would like. One per day or if you have the necessary time, even more, up to you…

.


Learn in one week how to get Best protection-The Practice

.

programmerman-animatedI will divide the tasks through a whole week, so it will be very easy for you to find the necessary time to achieve them, those who have the necessary time can, of course, achieve more tasks…

.

.

Day of the Week Web Address of Blog  Task  Necessary time
Monday Installing WOT + McAfee SiteAdvisor for knowing which websites are trustful and which ones are malicious!
“WOT” ALONE isn’t enough! My experience over years 😉
Windows + Mac5 minutes per program ONLY!
Tuesday Check if your browsers and its plugins are updated! Why should I?

Windows + Mac

5 minutes per browser ONLY!

Wednesday

 

Use BitDefender QuickScan and scan your computer! Find out if your computer is clean. It only takes a few seconds.Install Secunia Personal Software Inspector, which is checking and automating updates of Third Party Programs.

Windows

Few minutes ONLY for both programs!

Thursday Install Security Score which helps you to know if you made ALL the necessary updates…

Windows

5 minutes ONLY!

Friday Check any Friday if you got the latest updates! 10-15 minutes ONLY!
Saturday It’s Disk Encryption time: you need to install this software only once, so it’s ONLY a one time action!

Install an Encryption Software, I suggest the OpenSource Tool

 

Windows + Mac + LinuxSeveral hours…

Sunday: Use the Sunday for a relax check if everything is OK! It takes ONLY 5 minutes. Use the “Security Score” Software to check if everything is OK! 5 minutes ONLY!

.

As you can see in the table “Necessary Time”, most actions need ONLY 5-10 minutes! Eaaaaaaaasy to follow and to use, what are you waiting for!? 😉

.

For those who have the necessary time: I suggest to you to install first the FREE program “Security Score” (for WINDOWS ONLY) and start to check after your Tuesday-Task and after any days task to see the evolution of your security score! This will probably make you more confident and you certainly will try to reach a better “Security Score”, this for your motivation… Try it out:

.

Encryption-SecurityScore-before-after

.


Protect your Smartphone and be aware of malicious QR-Codes

qrcodes-intro-2

[Start Text from http://www.theregister.co.uk/2012/12/10/qr_code_sticker_scam/Cybercrooks are putting up stickers featuring URLs embedded in Quick Response codes (QR codes) as a trick designed to drive traffic to dodgy sites. [End Text from http://www.theregister.co.uk/2012/12/10/qr_code_sticker_scam/]

As it is impossible to see ONLY by viewing the QR-Code to detect if it redirects to an infected website, it is a MUST to install a QR-Reader who controls before sending you to the website! I recommend:


Concerning tablets

tablet-girl-170.

.

The guys from SOPHOS have created a very good post on their blog “Naked Security” which you should read here:

.

.


What YOU should know about Mobile-Security

.

.

Find protection for your Smartphone(s):

.


Be ALSO aware of your Online behavior

Check also the video below and be surprised…

.

This video reveals the magic behind the magic, making people aware of the fact that their entire life can be found online.

.

.


Learning By Doing Through A Game

I invite YOU ALSO to play the game below, YOU will learn the basics of Cyber Security by ===>LEARNing By Doing <===, enjoy it 😉

.

VOVALABS CyberSecurity Game

Click the image, please, to access the game.

.

Check also the link below, please, where YOU find the details:

.

WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01 .

    • We are ALL responsible for a secure Internet!
    • Automatic Windows Update must be enabled
    • For Apple devices: ALL the updates must be installed also!
    • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs also are vulnerable, we must also update them! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
    • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommended to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

===> I created a new Hashtag#FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

. Stay tuned for next free courses and tutorials 😉 .


Site Meter

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber-Hygiene: ICT Hygiene for Population, Education and Business

Cyber-Hygiene: ICT Hygiene for Population, Education and Business

.

Learning IT-Security

.

Read, think, learn and share over Social Media… Security is everyone’s responsibility! We are ALL responsible for Internet’s future!

.


===> “Nothing in life is to be feared. It is only to be understood.” Marie Curie <===


Cyber-Hygiene: Hygiene for ICT in Education and Business, sounds strange isn’t it? I will tell you about what it is, try to convince you why we should use it and getting used to it, it’s similar as Hygiene in real world…


Cyber-Hygiene: ICT Hygiene for Population, Education and Business

.

.

Create your own banner at mybannermaker.com!Make your own banner at MyBannerMaker.com!


.
PANDA Security Report April-June 2012
Click image to enlarge for best view and click here for the link to the PANDA report [pdf]
 


. 

KEYWORDS FOR THIS FREE COURSE and what you will learn:

.

3fy5eowy8suq3-1dw42q-womannursegeraldg.01Proactive Thinking, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

. .


We need to compare real world with virtual world to understand

.

vdujwtjyx3uq-252anv-p2pnicubuculei01When we talk about Hygiene in real life we mean taking our daily shower or bath, washing often enough the hands, brushing the teeth minimum twice a day and we must talk also about health; thus meaning: visiting the doctor regularly to avoid serious problems, especially up from a certain age… Hygiene means taking care of our body to have best health and also the responsibility not to infect other people because of bad hygiene and bad health! We need also to be informed about how to stay health by following hygiene tips provided by Education and also by the “Health Ministry”, where we find folders on different places and in 21st Century also now on Internet… We get also taught on practices which are dangerous… That’s the awareness about…

.

Computer Viruses and Threats

Click image above to access video

.

In real world our car needs some maintenance and technical control to make sure that there is no danger for other participants in traffic (pedestrians and drivers…), so the same in virtual world. Our computer is the “virtual car” who is driving on the “Data Highway” (Internet), it needs maintenance and especially care about IT-Security and safety

.

Check also the video below and be surprised…

.

This video reveals the magic behind the magic, making people aware of the fact that their entire life can be found online.

.

.

.

So, when working with a computer and “BYOD” (Bring Your Own Device), where “BYOD” is not only computers but also tablets and smartphones, we need to take care of them, whatever “Operating System” (OS) is installed! Otherwise if these devices don’t have the right maintenance and the right “Hygiene” they could infect other Internet users; whereby “Cyber-Hygiene” means here:

.

Check the video below, who explains best.

.

Mikko Hypponen: Fighting viruses, defending the net

.

.


National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”

.

Check also what CIO.GOV An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

.

.

We need to build up a Cyber-Hygiene Culture/How-To

.

community-jpegWe need to build up a Cyber-Hygiene Culture for a more secure Internet and in this culture we are ALL involved as Internet is a global Network and we could help a lot by using the “Social Medias” to this by sharing our good practices with others…

.

.

Learn more about “Social Media and its Influence” here: .

.
This Cyber-Culture-Hygiene could get build up by the already mentioned propositions in this blog and also from IT-Security Experts and people with very good knowledge about IT-Security on an volunteer-base as I did and still will doing as described in my following blog: 
.
.

Why should we do this?

.

The Internet will attract more hackers

Infographics source

The above Infographic is only an estimation, but I agree with it that Cyber-Crime will become more important as already NOW TV’s with mini-computer have vulnerabilities http://www.scoop.it/t/securite-pc-et-internet?tag=TV, the rest you could imagine yourself! You should think also on the raise of “Bring Your Own Device” (Hashtag = #BYOD), so there are more and more people using their own devices on work, devices who could represent a danger and risks for the Network the are connecting to if not well secured; switch on your Critical-Thinking please! We need a Proactive-Thinking!

.

25% BYOD Infected

Check the complete slideshow here

.

See the facts in reports of 2012 by professional companies here: .

Don’t forget that a security by 100% doesn’t exist and that in the future any fridge, TV, and other technical domestic device will include a mini-computer who can connect to Internet! And any mini-computer is vulnerable… By knowing NOW the facts we see the reality, we are well informed NOW and our Critical Thinking should make us understand that Cyber-Hygiene is a MUST!

.

IT-Security Training in any company

Check the complete slideshow here

.


We need new ideas how this Cyber-Hygiene-Culture could get build up

.

Mausi-interrogatifSome say that it is very difficult to build up a Cyber-Hygiene-Culture and they are right with it because persons need first to understand the “invisible threats” and “attacks” which are present! I invite you to read my “curation” about it here:

.

.
By having read these articles you will be able to understand the risks by using your critical thinking and you will be able to understand also why it is necessary to teach and to use a “Cyber-Hygiene” and also to share your new acquired knowledge with others…

.

Concerning new ideas, I share already since 2003-2004 a lot of ideas on How-To a “Cyber-Hygiene” could get used, please check here:

.

.


Is this “Cyber-Hygiene” advice only a help for Education?

.

Mausi-loupeAs already mentioned above and in the title of this blog, not ONLY for Education, but also for business and of course more then ever NOW also for the whole population as the majority of people around the world are using Internet and that in the future there will be more people using Internet and this certainly more with smartphones than with computers!!!

.

.

.

 

.

.

Any device connected to Internet needs to get protected, so also smartphones! Check also some FREE Apps here:

.

.


How could Cyber-Hygiene get introduced to Business?

.

community-jpegI suggest that the IT-Admin  of each company organizes meetings with the companies staff where he and the managers explain to the staff the dangers of “BYOD” and “BYOT” and that the technical staff elaborates also a strong “User-Policy” whereby any employee needs to check his device on the end of the week for updates and security updates! This event will take only between 15 min-30 minutes and should be a MUST! IT-Admin could block access to devices who are not conform to those mentioned Policy! Employees will so not only get used to IT-Security and Awareness on work, but will know so also the reflexes for at home in private life and by knowing these reflexes they will certainly also tell their children at home as well and probably also their acquaintances

.

25% BYOD Infected

Check the complete slideshow here

.

Related links:

.

..

Check the complete slideshow here

.


How could Cyber-Hygiene get introduced to the Population?

.

awareness_bg_gallery_display

.

Above screenshot shows you how Singapore acted very well, learn more http://www.scoop.it/t/securite-pc-et-internet?tag=Singapore%20marks%20cyber%20security%20awarenessYou could do similar, a call to action 😉 Read the article to learn more…

.

Read also my blogs “Ideas for a more secure Internet“:

.


 Learning By Doing Through A Game

I invite YOU ALSO to play the game below, YOU will learn the basics of Cyber Security by ===>LEARNing By Doing <===, enjoy it 😉

.

VOVALABS CyberSecurity Game

Click the image, please, to access the game.

.

Check also the link below, please, where YOU find the details:


What say the professionals?

..

.

An article from Forbes (7/14/2012) that you must read: “The threat is serious, and the time to prepare for it is now. The increasingly sophisticated  tools to change the world are in everyone’s hands as new technologies are introduced, but they are in the hands of criminals. It’s the wild west in this new technological frontier and we will see who outsmarts whom.

.

Goodman’s big idea is to have ordinary citizens around the world leverage these very same technologies for good, and to play a more prominent role in maintaining the safety and security of themselves and other citizens.


What did we learn and what we MUST learn for a more secure Internet

.

.

WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01 .

    • We are ALL responsible for a secure Internet!
    • Automatic Windows Update must be enabled
    • For Apple devices: ALL the updates must be installed also!
    • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
    • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

===> I created a new Hashtag#FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

. Stay tuned for next free courses and tutorials 😉 .


Site Meter

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

. .

Learning IT-Security

.

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn…

.

.

.

Keywords for this free course:

.

motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

===> Being ignorant is not so much a shame, as being unwilling to learn. <===

Benjamin Franklin

.
.

.

.


WHAT is The Pedagogy Of Education 3.0 And WHY Should WE Embrace It?

To make it very short, WE SHOULD embrace it as “mLEARNing” has more positive aspects as negative ones, please check below…

.

Education 3.0 and the pedagogy of Mobile-Learning

 

Click here to go to the original article ===> http://fr.slideshare.net/jgerst1111/education-30-and-the-pedagogy-of-mobile-learning <===

.

Check also my “Curation” about Mobile-Learning (mLearning):

.


What Teachers + Educators should learn about BYOD

TeacherMost of articles, blogs and Tweets written by educational people are showing the advantages of “Bring Your Own Device” (Hashtag for Twitter = #BYOD) and they embrace very well BYOD, which I do also; but…

.

There are some more things to consider such as:

  • A BYOD Policy in the campus, school…
  • Prepare for BYOD in your organization, thus meaning: training for ALL!
  • MDM: Mobile Device Management
  • Internal IT-Security Infrastructure
  • A special IT-Security Insurance

Read my complete curation about BYOD it here: http://www.scoop.it/t/21st-century-learning-and-teaching?q=BYOD where you will find also best articles and blogs who describe at it best what BYOD is as well as blogs from teachers who explain the benefits for Education…

===> Read and learn also about IT-Security, YES that is a MUST in 21st Century in Education, especially when using BYOD: <===

Learn also about eCitizen, Digital Citizenship where Teachers should stay there as good example and knowing about their responsability:

Responsability as eCitizen (Digital Citizen) for the Government, be a good patriot and know how to defend your Government against Cyber-Attacks and Cyberwar, why and how?

.

.

Principals: did you also think about your Schools, University reputation!? Imagine that there will be a data-breach, the Press would talk about and your reputation then!? You need to get protected by having a strong BYOD-Policy and a strong IT-Security infrastructure, think on that please…

Read more:

.

.

===> The above mentioned must be included in Education and especially when using BYOD, read these blogs and curated articles and you will understand that they are a MUST 😉 <=== 


Suggestions for a good BYOD Policy

.

BYOD

.

..

.

We need to know and to understand first that “Nobody Is Perfect”, no OS (Operating System) is 100% secure and there are vulnerabilities present, which need to get updated asap! This is not ONLY the IT-Admin’s task and responsibility, but our own responsibility!

.

.

Read also:

.

 

 

BYOD is becoming a prevalent Information Security and IT Focus

Image source

..

.

===> There is a need to for a healthy Cyber-Culture, a Cyber-Hygiene introduction for a more secure Internet! Read more: Cyber-Hygiene <===

.


Why our responsibility?

.

Question mark iconThe IT-Admin’s responsibility is to keep secure the School’s Network and to keep it safe from Malware and attacks; if it’s a good IT-Admin with good IT-Security knowledge he will even block infected devices to access the school network, that’s his good right! So imagine that you give courses with BYOD Infrastructure and some devices are infected and the IT-Admin blocks those, your course couldn’t get held as not all of your learners can access the school network, not funny at all that situation, isn’t it?

.

Check the complete slideshow here

My suggestions to prevent this is to organize a weekly security day in school for any class where the learners together with the teachers control their devices for latest updates and antivirus updates to make sure that they all are secure and don’t represent a danger and risks for the school network! Check the image below and read also the complete report from McAfee…

.

Total Mobile Malware Samples in the Database

McAfee Threats Report: Second Quarter 2012 

I suggest also that some teachers with good IT-Security knowledge create a “Security Club” in school where they train the learners about “IT-Security” to become “Security Scouts“, people with good IT-Security knowledge who can help others to stay secure. You will build up a secure community and the “Security Scouts” will be proud about their title and their responsible function. YES, responsibility that’s the right word which needs to get spread! In 21st Century Learning IT-Security and Internet-Safety are a MUST and should get maintained! Give a help to create the new 21st Century Heroes, the “IT-Security Scouts“!

Find below my blogs and other resources on How-To:

.

  1. IT-Security Scouts
  2. 5 minutes tutorials on How-To get smart about IT-Security
  3. BYOD in education–TechNet Jump Start training to help your planning
  4. MDM: Mobile Device Management
  5. 6 Keys To A Flexible MDM Strategy
  6. BYOD-Security-Becomes-a-Pervasive-Issue
  7. Is BYOD a Nightmare for IT-Security
  8. Apple, Mac, iOS4, iPad, iPhone and (in)security…
  9. UK govt encourages insurers to reward good IT security

The Internal Security of the School Network

.

Attention iconText from Higher Education-Data Breach [Start]Institutions of higher learning need to think like businesses AND consider the enormous financial and reputational dangers of a data breach. Unlike many businesses, colleges and universities are under constant attack, from within as well as without. [End]

A School Network has also data bases where the information of the learners are stored and which needs to kept private! Most countries have even laws about Privacy where the head of school could get taken responsible by court for a data breach, thus meaning: the principal would face severe punishment by law if the private data of the school staff and the learners would be made public by a data breach due to no IT-Security Policy in School’s.

Best way is that the Principal and his staff talks together with the IT-Admin on How-To build up best protection, especially when using BYOD, as BYOD could be dangerous and security risks are present in the School NetworkThere is also to consider supplement costs because of new staff for IT-Security and the costs of the whole IT-Security Infrastructure…

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

.

UneducatedEmployees_IG_554

Click image to go to source and to learn more…

.

Read also and stay always informed about news of Cybersecurity:

.


Tips for the IT-Admin

.

Chat iconLot of schools don’t have a professional IT-Admin, a person who has learned about IT-Security and who has the necessary skills about IT-Security, so here some Tips at least to give them some help:

.

.

.


Recommendations

.

sharing iconIt is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!

Parents could help their kids to achieve a weekly security task, reminding them about to do it by rewarding them and also by “punishing” them with a “Task-List“, check my FREE Online Google docs here:

.

Worksheets on Google Docs: 


What did we learn and what we must follow and respect!

..

 WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01

.

        • Automatic Windows Update must be enabled
        • For Apple devices: ALL the updates must be installed also!
        • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
        • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next course and tutorial…

.


Search Engine Submission – AddMe

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,