Artwork

Innhold levert av theinternationalschoolspodcast. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av theinternationalschoolspodcast eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Player FM - Podcast-app
Gå frakoblet med Player FM -appen!

97 - Special topic Podcast Cyber Security with Dan and John

59:48
 
Del
 

Manage episode 362577460 series 2600204
Innhold levert av theinternationalschoolspodcast. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av theinternationalschoolspodcast eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

Dan and John spend time exploring the topic of Cyber Security with Dan's work with schools and organisation and John's workshops and trainings on the topic. Dan shares his presentation on Cyber Security with thoughts, reflections and strategies on a topic that often is under the radar for educators and school leaders in International Schools.

With more options and flexibility to travel, and working remotely comes with some important steps to consider to ensure the cybersecurity of your devices and use.

2 step verification

Two-step verification is a process that involves two authentication methods performed one after the other to verify that someone or something requesting access is who or what they are declared to be.

How Two-Factor Authentication Works. (You can also use an app, but the phone is the most common method of using two-factor authentication.) Most forms of two-factor authentication ask you to sign in with your user name and password, and then enter a code that is sent to you via SMS.

Two-factor authentication:

Video

Virtual Private Networks (VPN) and your home

VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more

Surfing the web through a virtual private network ensures that your online activities are both private and secure.

VPN service is capable of keeping your private data safe from hackers, not viruses and malware. ... Well, we designed Buffered VPN to make use of 256-bit AES encryption. It's one of the most reliable encryption protocols out there. Articles

PC Magazine tested scores of VPN services, reviews and considered by PC Magazine to be the best VPN services.

Video

Anti Virus

Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your computer.

Passwords

According to the traditional advice—which is still good—a strong password: Has 15 Characters, Minimum: You need to choose a password that's long enough. ... Includes Numbers, Symbols, Capital Letters, and Lower-Case Letters: Use a mix of different types of characters to make the password harder to crack.

Smartphone security

Additional resources

John Mikton on Social Media

LinkedIn: https://www.linkedin.com/in/jmikton/

Twitter: https://twitter.com/jmikton

Web: beyonddigital.org

Dan Taylor on social media:

LinkedIn: https://www.linkedin.com/in/dantcz/

Twitter: https://twitter.com/DanTaylorAE

Web: www.appsevents.com

Listen on: iTunes / Podbean / Stitcher / Spotify / YouTube

Would you like to have a free 1 month trial of the new Google Workspace Plus (formerly G Suite Enterprise for Education)? Just fill out this form and we’ll get you set up bit.ly/GSEFE-Trial

  continue reading

102 episoder

Artwork
iconDel
 
Manage episode 362577460 series 2600204
Innhold levert av theinternationalschoolspodcast. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av theinternationalschoolspodcast eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

Dan and John spend time exploring the topic of Cyber Security with Dan's work with schools and organisation and John's workshops and trainings on the topic. Dan shares his presentation on Cyber Security with thoughts, reflections and strategies on a topic that often is under the radar for educators and school leaders in International Schools.

With more options and flexibility to travel, and working remotely comes with some important steps to consider to ensure the cybersecurity of your devices and use.

2 step verification

Two-step verification is a process that involves two authentication methods performed one after the other to verify that someone or something requesting access is who or what they are declared to be.

How Two-Factor Authentication Works. (You can also use an app, but the phone is the most common method of using two-factor authentication.) Most forms of two-factor authentication ask you to sign in with your user name and password, and then enter a code that is sent to you via SMS.

Two-factor authentication:

Video

Virtual Private Networks (VPN) and your home

VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more

Surfing the web through a virtual private network ensures that your online activities are both private and secure.

VPN service is capable of keeping your private data safe from hackers, not viruses and malware. ... Well, we designed Buffered VPN to make use of 256-bit AES encryption. It's one of the most reliable encryption protocols out there. Articles

PC Magazine tested scores of VPN services, reviews and considered by PC Magazine to be the best VPN services.

Video

Anti Virus

Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your computer.

Passwords

According to the traditional advice—which is still good—a strong password: Has 15 Characters, Minimum: You need to choose a password that's long enough. ... Includes Numbers, Symbols, Capital Letters, and Lower-Case Letters: Use a mix of different types of characters to make the password harder to crack.

Smartphone security

Additional resources

John Mikton on Social Media

LinkedIn: https://www.linkedin.com/in/jmikton/

Twitter: https://twitter.com/jmikton

Web: beyonddigital.org

Dan Taylor on social media:

LinkedIn: https://www.linkedin.com/in/dantcz/

Twitter: https://twitter.com/DanTaylorAE

Web: www.appsevents.com

Listen on: iTunes / Podbean / Stitcher / Spotify / YouTube

Would you like to have a free 1 month trial of the new Google Workspace Plus (formerly G Suite Enterprise for Education)? Just fill out this form and we’ll get you set up bit.ly/GSEFE-Trial

  continue reading

102 episoder

Все серии

×
 
Loading …

Velkommen til Player FM!

Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.

 

Hurtigreferanseguide

Copyright 2024 | Sitemap | Personvern | Vilkår for bruk | | opphavsrett