21st Century Tools for Teaching-People and Learners
103.0K views | +1 today
21st Century Tools for Teaching-People and Learners
21st Century Tools to help teaching-people and learners to achieve "BETTER" their tasks...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

DroidSheep Guard - Applications Android - CyberSecurity

DroidSheep Guard - Applications Android - CyberSecurity | 21st Century Tools for Teaching-People and Learners | Scoop.it
DroidSheep Guard protects your phone from DroidSheep, Faceniff & other hijackers DroidSheep Guard protects your phone from Tools like DroidSheep, Faceniff and other Se...
Gust MEES's insight:

 

Awareness and Protection!!!


Gust MEES's curator insight, April 14, 2013 9:22 AM

 

Awareness and Protection!!!

 

Scooped by Gust MEES
Scoop.it!

The Innovative Educator: Considering BYOT / BYOD next year?

The Innovative Educator: Considering BYOT / BYOD next year? | 21st Century Tools for Teaching-People and Learners | Scoop.it

Considering BYOT / BYOD next year? Get started with this sample policy & answers to FAQs

 

One of the best ways to prepare students to be prepared for the world is to help them use the tools of their world responsibly. Allowing students to bring their own devices is a terrific way to do just that, but even though some schools may have the wireless capacity and infrastructure, the admins / teachers may want to have a policy in place.

 

Below is the policy shared with me by Tim Clark who serves as the Coordinator of Instructional Technology for Forsyth County, GA Schools.

 

Read more:

http://theinnovativeeducator.blogspot.com/2012/05/considering-byot-byod-next-year-get.html

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Mobile phones expose businesses to massive risks

Mobile phones expose businesses to massive risks | 21st Century Tools for Teaching-People and Learners | Scoop.it

Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks.

These are the preliminary findings of a survey by PwC and Infosecurity Europe.


82% of large organisations reported security breaches caused by staff, including 47% who lost or leaked confidential information.


Only 39% of large organisations encrypt data downloaded to smart phones and tablets
54% of small businesses (38% of large organisations) don’t have a security awareness programme
While 52% of small businesses say social networking sites are important to their business, only 8% monitor what their staff post on those sites.

 

Some 75% of large organisations (and 61% of small businesses) allow staff to use smart phones and tablets to connect to their corporate systems and yet only 39% (24% of small businesses) apply data encryption on the devices.

 

Read more...

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Cybercrime goes mobile

Cybercrime goes mobile | 21st Century Tools for Teaching-People and Learners | Scoop.it

Corporate espionage has never been so easy. See how a simple app can transform your smartphone into an espionage tool in the hands of criminals, able to record your conversations, steal your text messages and spy on your private meetings.

 

Gust MEES: watch the video who explains in detail; very well explained...

http://www.net-security.org/secworld.php?id=13015

 

 

Check out also the available security tools :

http://www.scoop.it/t/ict-security-tools?q=mobile

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOT: Bring Your Own Token

BYOT: Bring Your Own Token | 21st Century Tools for Teaching-People and Learners | Scoop.it
SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization.

 

At the click of a button users can have their authentication token as an SMS on a mobile, an app on a smartphone or tablet, or a soft token on a laptop – with the ability to swap between devices at will.

 

Read more...

 

No comment yet.