21st Century Tools for Teaching-People and Learners
103.0K views | +0 today
Follow
21st Century Tools for Teaching-People and Learners
21st Century Tools to help teaching-people and learners to achieve "BETTER" their tasks...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

The next step in #BYOD #security

The next step in #BYOD #security | 21st Century Tools for Teaching-People and Learners | Scoop.it

The explosion in development and adoption of smartphones and tablets for both personal and business use in the past two years is both a blessing and a curse to IT departments globally.

 

Known as the Bring Your Own Device (BYOD) phenomenon, on one hand, there is an opportunity for greatly increased productivity and decreased costs.

 

===> On the other, there are increased security risks, management issues and even data and device ownership and governance issues. <===

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Mobility's Situational Unawareness

Mobility's Situational Unawareness | 21st Century Tools for Teaching-People and Learners | Scoop.it
Ignorance, as those in IT security know, is not bliss.

 

And, two new studies when viewed together show that consumer ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk.

 

===> Many organizations unduly place themselves at risk by allowing access to their computers by mobile devices used by employees who download apps without understanding their consequences. That doesn't seems like a smart information risk management policy; actually, it doesn't seem like a policy at all. <===

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD Infographic: For security it's not a pretty picture

BYOD Infographic: For security it's not a pretty picture | 21st Century Tools for Teaching-People and Learners | Scoop.it
As ESET's BYOD Infographic shows, BYOD is no LOL matter, bringing with it some serious risks to company networks and data. Based on an ESET Harris Interactive survey.

 

Another BYOD risk factor is the practice of letting someone else use the device. This could be "just" a family member or friend but it introduces the possibility of that person gaining access to the company network or sensitive company data stored on the device.

 

===> Furthermore, if this "other person" is not trained in safe computing practices there is a serious risk of them getting the device infected or compromised. <===

No comment yet.
Scooped by Gust MEES
Scoop.it!

Creating a Robust and Safe BYOD Program

Creating a Robust and Safe BYOD Program | 21st Century Tools for Teaching-People and Learners | Scoop.it

Network Security and More


Don Knezek, executive director of the International Society for Technology in Education (ISTE), notes that starting a BYOD program means making adjustments when it comes to security, especially protecting a district’s proprietary and secure data. That function, he says, used to be handled by an effective firewall that kept out unwanted users and their devices.

 

“Nowadays, you have to have a layer past the firewall that we didn’t have to deal with when we simply said no to user-owned devices,” he says. “Now all of a sudden, you have multiple points of entry at different levels of access, and that requires more diligence.”

One key to maintaining adequate security, Knezek and other experts say, is to have multiple networks: one for Wi-Fi traffic, one for district business and for other secure information for teachers and administrators only, and one for students and outside users of the district’s Web site.

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

The Security, Privacy and Legal Implications of BYOD

The Security, Privacy and Legal Implications of BYOD | 21st Century Tools for Teaching-People and Learners | Scoop.it

Employees are increasingly using (and demanding to use) their personal devices to store and process their employer's data, and connect to their network...

 

Even if cost-savings is not the goal, most companies believe that processing of company data on employee personal devices is inevitable and unavoidable. Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk.

 

Many companies are having to play catch-up to control these risks.

 

This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations.

 

Take the example of company-owned laptop issued to an employee. When it comes to security, the company can:


- determine and limit the type of devices that can be used;


- implement minimum system requirements and configurations;


- install security-related software to the device;
encrypt company data on the device;


- apply security patches;


- monitor the use of the device to detect misuse, hacking or malware;


- dictate how the device connects to the company’s network;


- install and update anti-virus software;


- provide support for the device; and
obtain/access the device for purposes of an investigation (because the company owns the device).

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

10 Innovative Schools Allowing Smartphones in the Classroom

10 Innovative Schools Allowing Smartphones in the Classroom | 21st Century Tools for Teaching-People and Learners | Scoop.it
Smartphones may help students become more engaged and interested in lessons.
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD security for cloud Wi-Fi access

BYOD security for cloud Wi-Fi access | 21st Century Tools for Teaching-People and Learners | Scoop.it
The BYOD trend is causing new security concerns for enterprise network and data security administrators.

 

===> Corporate users (e.g. employees, contractors) are accessing enterprise network and data, and bypassing corporate security controls using their personal Wi-Fi devices. <===

 

AirTight Networks introduced device fingerprinting techniques in its SpectraGuard Enterprise WIPS and AirTight Cloud Services that provide BYOD security and detection, classification and policy enforcement for smart devices connecting to enterprise networks.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Norton Snap QR Code Reader for iPhone, iPod touch

NEW! Norton™ Labs Snap is the first QR code scanner that protects you, your mobile device, and your important Stuff from online threats by warning you of dangerous QR codes and blocking unsafe websites before they load on your device.

 

Download Norton Snap QR Code Reader and enjoy it on your iPhone, iPad, and iPod touch.

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Bring your own: practical advice for handling BYOD

Bring your own: practical advice for handling BYOD | 21st Century Tools for Teaching-People and Learners | Scoop.it
If you work in IT, you’ve probably been here already. Someone important is proudly clutching a shiny new toy and asking you that vague, difficult question: "Can I use this?". So how do you respond?
No comment yet.
Rescooped by Gust MEES from Voices in the Feminine - Digital Delights
Scoop.it!

The 1-minute guide to the mobile classroom

The 1-minute guide to the mobile classroom | 21st Century Tools for Teaching-People and Learners | Scoop.it

Wondering how to start introducing elements of mLearning (mobile learning) into your language classes?

 

Here are five ways to do so, starting from simple recognition type activities to more complex project work...


Via Ana Cristina Pratas
No comment yet.
Scooped by Gust MEES
Scoop.it!

mobilemeupscotty - home

mobilemeupscotty - home | 21st Century Tools for Teaching-People and Learners | Scoop.it

Learning Activities That Capitalize On The Use of Mobile Devices:


Student response for polling/pop quizzes/content comments


Definitions, currency conversion, math equations, translations instantaneously


Internet browser to access information/research
News articles and current events


Online books


Education programs/apps such as Google Maps/GPS


Digital camera for school projects, publishing, etc.


Education of Positive Digital Footprint


Voice technology to share lectures/lessons/projects


Viewing video content such as Khan Academy


Blogging and microblogging about specific content


Development of Student Personal Learning Networks

No comment yet.
Scooped by Gust MEES
Scoop.it!

Pros and Cons of Bringing Your Own Device to Work | PCWorld Business Center

Pros and Cons of Bringing Your Own Device to Work | PCWorld Business Center | 21st Century Tools for Teaching-People and Learners | Scoop.it
The BYOD trend has a number of benefits for organizations, but there are also some caveats and pitfalls to consider before embracing it.

 

Make sure you have a clearly defined policy for BYOD that outlines the rules of engagement and states up front what the expectations are.

 

You should also lay out

 

===> minimum security requirements, or even mandate company-sanctioned security tools <===

 

as a condition for allowing personal devices to connect to company data and network resources.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile: More Districts Are Rewriting Acceptable Use Policies

Mobile: More Districts Are Rewriting Acceptable Use Policies | 21st Century Tools for Teaching-People and Learners | Scoop.it
Spotlight covers the intersections of technology and education, going behind the research to show how digital media is used in and out of classrooms to expand learning.

 

“When I talk to colleagues in Finland, they say, how do you filter?” said Jim Klein, director of Information Services and Technology at the Saugus Union School District in Southern California.

 

“They say, our kids’ filters are in their heads.

 

You do this by giving them a safe environment to educate themselves instead of sticking your head in the sand and pretending these technologies don’t exist.”

Dodie Ellen Ballard's curator insight, March 13, 2013 2:44 AM

While this seems to be a struggle for some educational institutions, the policies not only have to be re-written, but the re-write must embrace and not negate the use of technology.

Scooped by Gust MEES
Scoop.it!

Bring your own device scheme launches at school | ZDNet

Bring your own device scheme launches at school | ZDNet | 21st Century Tools for Teaching-People and Learners | Scoop.it
BYOD is now being trialed at a U.S. school as a pilot program.

 

Bring your own device (BYOD) schemes remain contentious in both educational and business networks.

 

In schools, who pays for theft, loss or damage? Can schools force parents to pay for devices as well as the yearly bill of school uniform and text books?

 

Are parents happy with the prospect of their children taking expensive products in to school, where damage is possible?

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Yvic Le Scouezec, IT Sr Manager, CISCO : BYOD, attention aux sauvegardes - Global Security Mag Online

Depuis 2009, Cisco a choisi de laisser libres ses collaborateurs de choisir leurs propres outils de communication. Cette décision a été prise afin de répondre aux désirs des employés mais aussi de mieux contrôler les coûts tout en augmentant l’offre de service.

 

Trois ans après, Yvic Le Scouezec, IT Sr Manager, CISCO tire les enseignements de ce choix s’il rencontre des problèmes au niveau des sauvegardes, il ‘ne reste pas moins que les gains en matière de productivité sont importants.

No comment yet.
Scooped by Gust MEES
Scoop.it!

This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD - Cult of Mac

This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD - Cult of Mac | 21st Century Tools for Teaching-People and Learners | Scoop.it
This iPad Class For Lawyers Hopes To Settle Tiffs Over BYOD [Interview]Cult of MacOn the front lines of the Bring-Your-Own-Device (BYOD) movement, she's created an iPad class approved by the New York State Continuing Legal Education Board.
No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

BYOD : Quels enjeux pour l’entreprise et comment définir le périmètre

« Quand le monde du grand public s’invite dans le monde professionnel » Le BYOD (Bring Your Own Device), tendance à fusionner l’utilisation de son (...)...
No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD To Work: with great freedom there comes great responsibility | Blog

BYOD To Work: with great freedom there comes great responsibility | Blog | 21st Century Tools for Teaching-People and Learners | Scoop.it

BYOD policy coming to a network near you

 

Many companies will continue to identify the risk of allowing personal devices and computers onto the corporate network as being too great. For example, Cisco research reports that 48% of respondents said their company would never authorise employees to bring their own devices although 57% agreed that some employees use personal devices without consent.

 

However, this is likely to change. The availability of new tools to help IT administrate and manage devices may overcome some of that initial resistance.

 

Perhaps the 'consumerisation' of IT, with the ubiquity of smartphones, tablets and laptops, and cloud-based services will provide an ===> irrepressible demand for BYOD policies to be adopted. <===

 

But whether the drive to consume learning on personal devices comes from within or outside of the corporate firewall, the nature of the demand will continue to diversify and present us with new possibilities and challenges.

No comment yet.
Scooped by Gust MEES
Scoop.it!

What are QR-Codes?

What are QR-Codes? | 21st Century Tools for Teaching-People and Learners | Scoop.it
Hi, You probably have seen on my start page these strange squares with black and white dots and squares and were asking yourself, what is this? .

 

That are QR-Codes who can get used with your smartp...

No comment yet.
Scooped by Gust MEES
Scoop.it!

So schützen Sie Ihr Smartphone vor Viren

So schützen Sie Ihr Smartphone vor Viren | 21st Century Tools for Teaching-People and Learners | Scoop.it
Antiviren-Software auf dem PC ist heute so selbstverständlich wie das Schloss an der Haustür – nur bei Smartphones nicht. Wir zeigen, wie Sie Handy-Schädlinge abwehren.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Strong Policies A Must For BYOD | Fortinet Security Blog

Strong Policies A Must For BYOD | Fortinet Security Blog | 21st Century Tools for Teaching-People and Learners | Scoop.it

More and more organizations are opening up their networks with invitations that say BYOD (bring your own device) and seeing everything from iPads to the latest Android gadget walk in their doors.

 

Sounds like a win-win?

 

Well, here’s the dilemma—while everyone wants to be more efficient, surprisingly few organizations have policies in place to adequately ===> secure the influx of mobile devices being introduced into the workplace. <===

 

Read more...

No comment yet.
Scooped by Gust MEES
Scoop.it!

Tech-Savvy Classrooms to Personalize Learning « Social Policy in Ontario

Tech-Savvy Classrooms to Personalize Learning « Social Policy in Ontario | 21st Century Tools for Teaching-People and Learners | Scoop.it

One day, fellow teachers will shake their heads at the idea that we once confiscated phones from students, refused to give them the school WIFI password, and required permission to use their own laptops in class.


After all, today’s students carry with them some of the most powerful learning tools ever known. Why not teach students how to use them, rather than tell them to put them away, to leave them in their lockers or to turn them off? As teacher William Stites says on his blog, “If we want students to communicate, does it matter what tool they use to get the message out?”

 

Gust MEES: "When working with #BYOT and #BYOD, don't forget #itsecurity!

 

More info here:

http://www.scoop.it/t/securite-pc-et-internet?tag=BYOD

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Three steps to ensuring BYOD doesnt lead to BYOT bring your own threat

Three steps to ensuring BYOD doesnt lead to BYOT bring your own threat | 21st Century Tools for Teaching-People and Learners | Scoop.it
As many organisations rush to adopt technologies that enable their workforce to be more mobile and satiate user demand that IT support mobile devices, security often becomes an afterthought.
No comment yet.