21st Century Tools for Teaching-People and Learners
103.0K views | +0 today
21st Century Tools for Teaching-People and Learners
21st Century Tools to help teaching-people and learners to achieve "BETTER" their tasks...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

DroidSheep Guard - Applications Android - CyberSecurity

DroidSheep Guard - Applications Android - CyberSecurity | 21st Century Tools for Teaching-People and Learners | Scoop.it
DroidSheep Guard protects your phone from DroidSheep, Faceniff & other hijackers DroidSheep Guard protects your phone from Tools like DroidSheep, Faceniff and other Se...
Gust MEES's insight:

 

Awareness and Protection!!!


Gust MEES's curator insight, April 14, 2013 9:22 AM

 

Awareness and Protection!!!

 

Scooped by Gust MEES
Scoop.it!

The Innovative Educator: Considering BYOT / BYOD next year?

The Innovative Educator: Considering BYOT / BYOD next year? | 21st Century Tools for Teaching-People and Learners | Scoop.it

Considering BYOT / BYOD next year? Get started with this sample policy & answers to FAQs

 

One of the best ways to prepare students to be prepared for the world is to help them use the tools of their world responsibly. Allowing students to bring their own devices is a terrific way to do just that, but even though some schools may have the wireless capacity and infrastructure, the admins / teachers may want to have a policy in place.

 

Below is the policy shared with me by Tim Clark who serves as the Coordinator of Instructional Technology for Forsyth County, GA Schools.

 

Read more:

http://theinnovativeeducator.blogspot.com/2012/05/considering-byot-byod-next-year-get.html

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

security in the age of mobility [pdf]

” Mobile devices can expose users’ and
organizations’ valuable data to unauthorized people if
necessary precautions are not taken.

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

F-Secure - Protection - Free Anti-Theft for Mobile

F-Secure - Protection - Free Anti-Theft for Mobile | 21st Century Tools for Teaching-People and Learners | Scoop.it

Anti-Theft is an application for your mobile phone that provides a great way to protect it if it gets lost or stolen – and it’s FREE!

 

 

 


This is what you get:


- Easy to install and use


- Protects your confidential information against loss or theft


- Helps you locate your phone

 

Read more...

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Mobile phones expose businesses to massive risks

Mobile phones expose businesses to massive risks | 21st Century Tools for Teaching-People and Learners | Scoop.it

Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks.

These are the preliminary findings of a survey by PwC and Infosecurity Europe.


82% of large organisations reported security breaches caused by staff, including 47% who lost or leaked confidential information.


Only 39% of large organisations encrypt data downloaded to smart phones and tablets
54% of small businesses (38% of large organisations) don’t have a security awareness programme
While 52% of small businesses say social networking sites are important to their business, only 8% monitor what their staff post on those sites.

 

Some 75% of large organisations (and 61% of small businesses) allow staff to use smart phones and tablets to connect to their corporate systems and yet only 39% (24% of small businesses) apply data encryption on the devices.

 

Read more...

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Cybercrime goes mobile

Cybercrime goes mobile | 21st Century Tools for Teaching-People and Learners | Scoop.it

Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your conversations, steal your text messages and spy on your private meetings.

 

Gust MEES: watch the video who explains in detail; very well explained...

http://www.net-security.org/secworld.php?id=13015

 

 

Check out also the available security tools :

http://www.scoop.it/t/ict-security-tools?q=mobile

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

If You Have a Smart Phone, Anyone Can Now Track Your Every Move

If You Have a Smart Phone, Anyone Can Now Track Your Every Move | 21st Century Tools for Teaching-People and Learners | Scoop.it
Navizon I.T.S. makes it easy to pinpoint Wi-Fi devices anywhere its listening nodes are installed.
No comment yet.
Scooped by Gust MEES
Scoop.it!

The Security, Privacy and Legal Implications of BYOD

The Security, Privacy and Legal Implications of BYOD | 21st Century Tools for Teaching-People and Learners | Scoop.it
The Security, Privacy and Legal Implications of BYOD


Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable.

 

Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. Many companies are having to play catch-up to control these risks.

 

===> This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations. <===

 

Read more...

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOT: Bring Your Own Token

BYOT: Bring Your Own Token | 21st Century Tools for Teaching-People and Learners | Scoop.it
SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization.

 

At the click of a button users can have their authentication token as an SMS on a mobile, an app on a smartphone or tablet, or a soft token on a laptop – with the ability to swap between devices at will.

 

Read more...

 

No comment yet.