Skip to main content

Home/ Ed Tech Crew/ Group items tagged #security

Rss Feed Group items tagged

Katherin Smith

Tips to Keep Yourself Safe While Using Public WIFI| Norton Support Call +61-1800-769-90... - 0 views

  •  
    tips on protecting your online security when you are using public wi-fi hotspots.
Melinda Cashen

How Secure Is My Password? - 5 views

  •  
    This would be great to show students how important password selection is.
John Pearce

Kill the Password: Why a String of Characters Can't Protect Us Anymore | Gadget Lab | W... - 1 views

  •  
    "No matter how complex, no matter how unique, your passwords can no longer protect you."
Camilla Elliott

We Live Security - ESET security community - 1 views

  •  
    The new website of ESET (April 2013).  This site contains a variety of expert opinions, white papers and research.  Regular short podcasts are most informative.
John Pearce

Data Security Is a Classroom Worry, Too - NYTimes.com - 0 views

  •  
    "LIKE many privacy-minded parents of elementary students, Tony Porterfield tries to keep close tabs on the personal information collected about his two sons. So when he heard that their school district in Los Altos, Calif., had adopted Edmodo, an online learning network connecting more than 20 million teachers and students around the world, he decided to check out the program."
Roland Gesthuizen

Correct Horse Battery Staple | Generate Secure Memorable Passwords - 0 views

  •  
    "Secure password generator to help keep you safer online"
John Pearce

The Truths, Untruths, and Fuzzy Truths of Cloud Security - 2 views

  •  
    I recently wrote two articles about the growth of cloud computing: The Perfect Storm for Cloud Computing, and Enough Already! Cloud Computing Is Here to Stay. Both articles were written with the intention of concreting the fact that businesses and IT professionals need to begin, now, to develop their cloud strategy. The articles, read by over 23,000 people at the time of this writing, opened a floodgate of comments about the security concerns of cloud computing. So now I am going to address the truths, the untruths, and the fuzzy truths of security in the cloud.
John Pearce

Technology Infographics: Social Media Privacy, Cyber Security and More | Veracode Blog - 6 views

  •  
    Veracode Security Blog: Application security research, security trends and opinions » INFOGRAPHICS
John Pearce

Digital storm on the horizon - 0 views

  •  
    "Michael Fraser calls it the ''rubbish web''. That is the internet we will be left with in five to 10 years unless governments and cyber corporations fix the holes that allow criminals to infiltrate the world wide web and strip global citizens of their identity, money and dignity, he believes. In his bleak view, those who can afford it will retreat behind private corporatised security walls."
Tony Richards

Mozilla Calls on World to Protect Firefox Browser From the NSA | Wired Enterprise | Wir... - 2 views

  •  
    The web is being controlled - good for a podcast discussion.
Ian Guest

PRISM Break - 0 views

  •  
    "Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora. Stop governments from spying on you by encrypting your communications and ending your reliance on proprietary services."
  •  
    via @dajbelshaw
John Pearce

Gen Y Isn't Following Your BYOD Security Measures - 0 views

  •  
    "Bring your own device is a trend that isn't going anywhere - we've established that. But do we discuss the risks involved with it enough? According to this article by Rebecca M. Abrahams, chief communications officer for Ziklag Systems LLC, a mobile security technology company, not many companies or government agencies have what can be called serious corporate mobile device security policies. And those that do have policies aren't necessarily having them followed."
John Pearce

Free wi-fi hotspots are a data risk: SSO Alert Priority Moderate | Stay Smart Online - 1 views

  •  
    "Subscribers should be cautious about using free wireless hotspots. In particular, you should avoid sending sensitive or personal information over these untrusted networks. Free wi-fi hotspots can be found in coffee shops and public establishments, offering convenient internet access over a wireless connection. You can connect to these hotspots using devices such as mobile phones or laptops with wireless capabilities. However, it is important to be aware that most of these hotspots are unsecured, meaning that all the information you send across them is vulnerable."
Ian Guest

Good to Know - 4 views

  •  
    "A guide to staying safe and secure online " from Google
John Pearce

Moving to the Cloud? What should you consider? | Lucacept - intercepting the Web - 3 views

  •  
    "What I gained from this exercise was a thorough understanding of issues surrounding Cloud Computing and the information I needed to be able to speak confidently with my school community about the move we were making. If you're a school looking to move into the Cloud Computing space, then measures like this are necessary. If you're an Australian school looking for links to assist you with the process, then take a look at the following."
1 - 20 of 45 Next › Last »
Showing 20 items per page