21st Century Tools for Teaching-People and Learners
103.0K views | +0 today
Follow
21st Century Tools for Teaching-People and Learners
21st Century Tools to help teaching-people and learners to achieve "BETTER" their tasks...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

security in the age of mobility [pdf]

” Mobile devices can expose users’ and
organizations’ valuable data to unauthorized people if
necessary precautions are not taken.

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Mobile phones expose businesses to massive risks

Mobile phones expose businesses to massive risks | 21st Century Tools for Teaching-People and Learners | Scoop.it

Organizations are failing to respond to the culture of employees using their own mobile devices for work and are opening up their systems to security risks.

These are the preliminary findings of a survey by PwC and Infosecurity Europe.


82% of large organisations reported security breaches caused by staff, including 47% who lost or leaked confidential information.


Only 39% of large organisations encrypt data downloaded to smart phones and tablets
54% of small businesses (38% of large organisations) don’t have a security awareness programme
While 52% of small businesses say social networking sites are important to their business, only 8% monitor what their staff post on those sites.

 

Some 75% of large organisations (and 61% of small businesses) allow staff to use smart phones and tablets to connect to their corporate systems and yet only 39% (24% of small businesses) apply data encryption on the devices.

 

Read more...

No comment yet.
Scooped by Gust MEES
Scoop.it!

Mobile: More Districts Are Rewriting Acceptable Use Policies

Mobile: More Districts Are Rewriting Acceptable Use Policies | 21st Century Tools for Teaching-People and Learners | Scoop.it
Spotlight covers the intersections of technology and education, going behind the research to show how digital media is used in and out of classrooms to expand learning.

 

“When I talk to colleagues in Finland, they say, how do you filter?” said Jim Klein, director of Information Services and Technology at the Saugus Union School District in Southern California.

 

“They say, our kids’ filters are in their heads.

 

You do this by giving them a safe environment to educate themselves instead of sticking your head in the sand and pretending these technologies don’t exist.”

Dodie Ellen Ballard's curator insight, March 13, 2013 2:44 AM

While this seems to be a struggle for some educational institutions, the policies not only have to be re-written, but the re-write must embrace and not negate the use of technology.

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

The Security, Privacy and Legal Implications of BYOD

The Security, Privacy and Legal Implications of BYOD | 21st Century Tools for Teaching-People and Learners | Scoop.it

Employees are increasingly using (and demanding to use) their personal devices to store and process their employer's data, and connect to their network...

 

Even if cost-savings is not the goal, most companies believe that processing of company data on employee personal devices is inevitable and unavoidable. Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk.

 

Many companies are having to play catch-up to control these risks.

 

This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations.

 

Take the example of company-owned laptop issued to an employee. When it comes to security, the company can:


- determine and limit the type of devices that can be used;


- implement minimum system requirements and configurations;


- install security-related software to the device;
encrypt company data on the device;


- apply security patches;


- monitor the use of the device to detect misuse, hacking or malware;


- dictate how the device connects to the company’s network;


- install and update anti-virus software;


- provide support for the device; and
obtain/access the device for purposes of an investigation (because the company owns the device).

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

The Security, Privacy and Legal Implications of BYOD

The Security, Privacy and Legal Implications of BYOD | 21st Century Tools for Teaching-People and Learners | Scoop.it
The Security, Privacy and Legal Implications of BYOD


Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable.

 

Unfortunately, BYOD raises significant data security and privacy concerns, which can lead to potential legal and liability risk. Many companies are having to play catch-up to control these risks.

 

===> This blogpost identifies and explores some of the key privacy and security legal concerns associated with BYOD, including “reasonable” BYOD security, BYOD privacy implications, and security and privacy issues related to BYOD incident response and investigations. <===

 

Read more...

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How to create a BYOD policy

How to create a BYOD policy | 21st Century Tools for Teaching-People and Learners | Scoop.it
A BYOD policy can eliminate a lot of the problems associated with bring your own device programs. Learn best practices for creating a BYOD policy.

 

BYOD isn’t a synonym for “free for all.” Once an organization decides to let employees use their own mobile devices and PCs for work, it must put a BYOD policy in place to control this usage.

 

===> Requires Free Membership to View

 

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Mobility's Situational Unawareness

Mobility's Situational Unawareness | 21st Century Tools for Teaching-People and Learners | Scoop.it
Ignorance, as those in IT security know, is not bliss.

 

And, two new studies when viewed together show that consumer ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk.

 

===> Many organizations unduly place themselves at risk by allowing access to their computers by mobile devices used by employees who download apps without understanding their consequences. That doesn't seems like a smart information risk management policy; actually, it doesn't seem like a policy at all. <===

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

So schützen Sie Ihr Smartphone vor Viren

So schützen Sie Ihr Smartphone vor Viren | 21st Century Tools for Teaching-People and Learners | Scoop.it
Antiviren-Software auf dem PC ist heute so selbstverständlich wie das Schloss an der Haustür – nur bei Smartphones nicht. Wir zeigen, wie Sie Handy-Schädlinge abwehren.
No comment yet.