<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[EDU: Digital CitiZENship, CyberSecurity, eSkills, Modern EDU  by Gust MEES]]></provider_name><provider_url><![CDATA[https://gustmees.wordpress.com]]></provider_url><author_name><![CDATA[Gust MEES]]></author_name><author_url><![CDATA[https://gustmees.wordpress.com/author/luxwebwizard/]]></author_url><title><![CDATA[Twitter Chat | The Economic Impact Of&nbsp;Cybercrime]]></title><type><![CDATA[link]]></type><html><![CDATA[<p><span style="color: #ffffff;">.</span></p>
<p>&nbsp;</p>
<p><a href="https://gustmees.files.wordpress.com/2012/05/screenhunter_02-may-02-19-02-e1402099610109.jpg"><img loading="lazy" data-attachment-id="370" data-permalink="https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/screenhunter_02-may-02-19-02/" data-orig-file="https://gustmees.files.wordpress.com/2012/05/screenhunter_02-may-02-19-02-e1402099610109.jpg" data-orig-size="600,432" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Learning basics of IT-Security and Cyber-Security" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2012/05/screenhunter_02-may-02-19-02-e1402099610109.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2012/05/screenhunter_02-may-02-19-02-e1402099610109.jpg?w=600" class="aligncenter size-full wp-image-370" src="https://gustmees.files.wordpress.com/2012/05/screenhunter_02-may-02-19-02-e1402099610109.jpg?w=600&#038;h=432" alt="Learning basics of IT-Security and Cyber-Security" width="600" height="432" srcset="https://gustmees.files.wordpress.com/2012/05/screenhunter_02-may-02-19-02-e1402099610109.jpg 600w, https://gustmees.files.wordpress.com/2012/05/screenhunter_02-may-02-19-02-e1402099610109.jpg?w=150&amp;h=108 150w, https://gustmees.files.wordpress.com/2012/05/screenhunter_02-may-02-19-02-e1402099610109.jpg?w=300&amp;h=216 300w" sizes="(max-width: 600px) 100vw, 600px" /></a></p>
<p><span style="color: #ffffff;">.</span></p>
<hr />
<h1><span style="color: #000000;">Twitter Chat | The Economic Impact Of Cybercrime</span></h1>
<p><span style="color: #ffffff;">.</span></p>
<p><a href="https://gustmees.files.wordpress.com/2014/08/screenhunter_04-aug-29-16-52.jpg"><img loading="lazy" data-attachment-id="5286" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/screenhunter_04-aug-29-16-52/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_04-aug-29-16-52.jpg" data-orig-size="750,260" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="SecChat McAfee" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_04-aug-29-16-52.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_04-aug-29-16-52.jpg?w=750" class="aligncenter  wp-image-5286" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_04-aug-29-16-52.jpg?w=600&#038;h=208" alt="SecChat McAfee" width="600" height="208" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_04-aug-29-16-52.jpg?w=600&amp;h=208 600w, https://gustmees.files.wordpress.com/2014/08/screenhunter_04-aug-29-16-52.jpg?w=150&amp;h=52 150w, https://gustmees.files.wordpress.com/2014/08/screenhunter_04-aug-29-16-52.jpg?w=300&amp;h=104 300w, https://gustmees.files.wordpress.com/2014/08/screenhunter_04-aug-29-16-52.jpg 750w" sizes="(max-width: 600px) 100vw, 600px" /></a></p>
<p>&nbsp;</p>
<p style="text-align: justify;">On Thursday, September 4<sup>th</sup> there will be <a title="Twitter Chat #SecChat" href="https://twitter.com/search?f=realtime&amp;q=%23SecChat&amp;src=typd" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">#SecChat</span></span></strong></a> who will explore the <strong><span style="color: #000000;"> The Economic Impact Of Cybercrime</span></strong> and is an hour-long Twitter chat. I got invited through Twitter by <strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a class="twitter-atreply pretty-link" style="color: #0000ff; text-decoration: underline;" title="@McAfeeBusiness" href="https://twitter.com/McAfeeBusiness" target="_blank"><s>@</s>McAfeeBusiness</a></span></span></strong></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/08/screenhunter_02-aug-30-13-36.jpg"><img loading="lazy" data-attachment-id="5295" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/screenhunter_02-aug-30-13-36/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_02-aug-30-13-36.jpg" data-orig-size="590,573" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="#SecChat" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_02-aug-30-13-36.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_02-aug-30-13-36.jpg?w=590" class="aligncenter size-full wp-image-5295" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_02-aug-30-13-36.jpg?w=590&#038;h=573" alt="#SecChat" width="590" height="573" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_02-aug-30-13-36.jpg 590w, https://gustmees.files.wordpress.com/2014/08/screenhunter_02-aug-30-13-36.jpg?w=150&amp;h=146 150w, https://gustmees.files.wordpress.com/2014/08/screenhunter_02-aug-30-13-36.jpg?w=300&amp;h=291 300w" sizes="(max-width: 590px) 100vw, 590px" /></a></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;">After long reflection I decided to create a blog about my advice as I think that it would be very difficult to answer these questions by Tweets. There are TOO MANY links and information, as well as advice to share that in the mass of shared Tweets they would get lost 😉 This allows me then in the Tweet on the Chat to post ONLY one link, the link to this blog, where ALL the necessary information are included and I could concentrate on the other Tweets much more easy!</p>
<h2 style="text-align: justify;"><strong><span style="color: #000000;">AND I could ALSO use this blog post for my FREE courses about CyberSecurity!</span></strong></h2>
<p style="text-align: justify;">As a reminder (ALSO for me), here below the blog posts about WHAT would get discussed:</p>
<ul>
<li style="text-align: justify;"><a title="Impact: espionage-Intellectual Property" href="http://blogs.mcafee.com/business/impact-espionage-intellectual-property" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">http://blogs.mcafee.com/business/impact-espionage-intellectual-property</span></span></strong></a></li>
<li style="text-align: justify;"><a title="Impact-CyberCrime (PDF)" href="http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf</span></span></strong></a></li>
<li style="text-align: justify;">&#8230;</li>
</ul>
<p>I suggest to read my blog post from a previous Twitter Chat WHERE already a lot was discussed, please:</p>
<ul>
<li>
<h1 class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Twitter Chat: Security risks SMBs face" href="https://gustmees.wordpress.com/2014/06/07/twitter-chat-security-risks-smbs-face/" target="_blank" rel="bookmark">Twitter Chat: Security risks SMBs face</a></span></span></strong></h1>
</li>
</ul>
<p>&nbsp;</p>
<p style="text-align: justify;">Here, below, is about the #SecChat:</p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/08/screenhunter_08-aug-31-23-06.jpg"><img loading="lazy" data-attachment-id="5310" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/screenhunter_08-aug-31-23-06/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_08-aug-31-23-06.jpg" data-orig-size="659,106" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="#SecChat about" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_08-aug-31-23-06.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_08-aug-31-23-06.jpg?w=659" class="aligncenter  wp-image-5310" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_08-aug-31-23-06.jpg?w=603&#038;h=97" alt="#SecChat about" width="603" height="97" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_08-aug-31-23-06.jpg?w=603&amp;h=97 603w, https://gustmees.files.wordpress.com/2014/08/screenhunter_08-aug-31-23-06.jpg?w=150&amp;h=24 150w, https://gustmees.files.wordpress.com/2014/08/screenhunter_08-aug-31-23-06.jpg?w=300&amp;h=48 300w, https://gustmees.files.wordpress.com/2014/08/screenhunter_08-aug-31-23-06.jpg 659w" sizes="(max-width: 603px) 100vw, 603px" /></a></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;">So here we go, my questions:</p>
<ul>
<li style="text-align: justify;"><strong>Q1: What security risks do SMBs need to consider when starting a business and why?</strong></li>
<li style="text-align: justify;"><strong>Q2: CyberSecurity is OUR ALL Responsibility! SHOULDN&#8217;T the basics of CyberSecurity getting taught in schools up from the early age?</strong></li>
<li style="text-align: justify;"><strong>Q3: WHY aren&#8217;t CyberSecurity professionals, especially CyberSecurity companies present at schools!?</strong></li>
<li style="text-align: justify;"><strong>Q4: WHAT could get done to lowering Cybercrime?</strong></li>
</ul>
<p>&nbsp;</p>
<hr />
<h1 style="text-align: justify;"><span style="text-align: justify; color: #000000;">Q1: What security risks do SMBs need to consider when starting a business and why?</span></h1>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2012/11/programmerman-animated.gif"><img loading="lazy" data-attachment-id="1948" data-permalink="https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/programmerman-animated/" data-orig-file="https://gustmees.files.wordpress.com/2012/11/programmerman-animated.gif" data-orig-size="107,98" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="programmerman-animated" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2012/11/programmerman-animated.gif?w=107" data-large-file="https://gustmees.files.wordpress.com/2012/11/programmerman-animated.gif?w=107" class="alignleft size-full wp-image-1948" src="https://gustmees.files.wordpress.com/2012/11/programmerman-animated.gif?w=107&#038;h=98" alt="programmerman-animated" width="107" height="98" /></a>Well, first of all <span style="color: #000000;"><strong>SMBs don&#8217;t have to forget that they deal with employees and that THE weakest link in the security chain is the human!</strong></span></p>
<p><span style="color: #ffffff;">.</span></p>
<p>Please check my following blog posts who explain in detail:</p>
<p><span style="color: #ffffff;">.</span></p>
<ul>
<li><a title="Cyber-Security: the weakest link in the security chain is the human" href="https://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/" target="_blank"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong>https://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human</strong>/</span></span></a></li>
<li><span style="color: #0000ff;"><a title="Naivety in the digital age" href="https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/" target="_blank"><span style="text-decoration: underline; color: #0000ff;"><strong>https://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/</strong></span></a></span></li>
<li style="text-align: justify;"><a title="Impact: espionage-Intellectual Property" href="http://blogs.mcafee.com/business/impact-espionage-intellectual-property" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">http://blogs.mcafee.com/business/impact-espionage-intellectual-property</span></span></strong></a></li>
<li style="text-align: justify;"><a title="Impact-CyberCrime (PDF)" href="http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf</span></span></strong></a></li>
</ul>
<p style="text-align: justify;"><strong><span style="color: #000000;">As nearly everyone is using a smartphone today</span></strong> so there is ALSO a MUST to consider a &#8220;<strong><span style="color: #000000;">BYOD-Policy</span></strong>&#8221; (<strong><span style="color: #000000;">Bring Your Own Device</span></strong>) as the use of smartphones could be a <strong><span style="color: #000000;">BIG security risk</span></strong> to the SMB&#8217;s as <strong><span style="color: #000000;">MOST employees don&#8217;t have any knowledge about the basics of Cyber-Security</span></strong>, even that there smartphones and/or tablets, laptops could be infected with <strong><span style="color: #000000;">virus</span></strong>, <strong><span style="color: #000000;">trojans</span></strong>, <strong><span style="color: #000000;">keylogger</span></strong>&#8230;</p>
<p>Please read my blog post about <strong><span style="color: #000000;">BYOD</span></strong> below:</p>
<ul>
<li><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a title="Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure" href="https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/" target="_blank"><span style="color: #0000ff; text-decoration: underline;">https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/</span></a></span></span></strong></li>
</ul>
<p><span style="color: #ffffff;">.</span></p>
<hr />
<h1 style="text-align: justify;"><strong>Q2: CyberSecurity is OUR ALL Responsibility! SHOULDN&#8217;T the basics of CyberSecurity getting taught in schools up from the early age?</strong></h1>
<p>My personal answer is a clear YES! My prepared FREE courses below:</p>
<ul>
<li><a title="Get smart with 5 minutes tutorials about Cyber Security" href="https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/</span></span></strong></a></li>
<li>&#8230;</li>
</ul>
<p style="text-align: justify;"> AND Today on September 1st 2014 I found this on the internet which I highly WELCOME! Coding in the curriculum for Five-Year-Old with introduction to CyberSecurity, GREAT!</p>
<p><span style="color: #ffffff;">.</span></p>
<p><a href="http://www.scmagazineuk.com/five-year-olds-to-learn-coding-in-school/article/369019/" target="_blank"><img loading="lazy" data-attachment-id="5335" data-permalink="https://gustmees.wordpress.com/2014/08/24/coding-a-new-trend-in-education-and-a-big-responsibility/screenhunter_03-sep-01-18-11/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_03-sep-01-18-11.jpg" data-orig-size="694,385" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Five-Year-Old learn Coding" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_03-sep-01-18-11.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_03-sep-01-18-11.jpg?w=694" class="aligncenter wp-image-5335" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_03-sep-01-18-11.jpg?w=600&#038;h=333" alt="Five-Year-Old learn Coding" width="600" height="333" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_03-sep-01-18-11.jpg?w=600&amp;h=333 600w, https://gustmees.files.wordpress.com/2014/08/screenhunter_03-sep-01-18-11.jpg?w=150&amp;h=83 150w, https://gustmees.files.wordpress.com/2014/08/screenhunter_03-sep-01-18-11.jpg?w=300&amp;h=166 300w, https://gustmees.files.wordpress.com/2014/08/screenhunter_03-sep-01-18-11.jpg 694w" sizes="(max-width: 600px) 100vw, 600px" /></a></p>
<p>&nbsp;</p>
<p style="text-align: center;"><strong><span style="color: #000000;">Click the image to access the article, please.</span></strong></p>
<p>.</p>
<p>&nbsp;</p>
<hr />
<h1 style="text-align: justify;"><strong>Q3: WHY aren&#8217;t CyberSecurity professionals, especially CyberSecurity companies present at schools!?</strong></h1>
<p>.</p>
<p>.</p>
<p>.</p>
<p>&nbsp;</p>
<p>.</p>
<p>.</p>
<p>.</p>
<hr />
<h1><strong>Q4: WHAT could get done to lowering Cybercrime?</strong></h1>
<p style="text-align: justify;">Well, there are a lot of possibilities, who are MOSTLY related to <strong><span style="color: #000000;">===&gt; EDUCATION &lt;===</span></strong> and while using <strong><span style="color: #000000;">Social Media</span></strong>. Personally I use very often <strong><span style="color: #000000;">Twitter</span></strong> to send my advice to my readers. I started ages ago the <strong><span style="color: #000000;">===&gt; Friday Security Check Day &lt;===</span></strong>, hashtag is <strong><span style="color: #000000;">===&gt; <a title="Twitter #FSCD" href="https://twitter.com/search?f=realtime&amp;q=%23fscd&amp;src=typd" target="_blank"><span style="text-decoration: underline; color: #0000ff;"><span style="text-decoration: underline;">#FSCD</span></span></a> &lt;===</span></strong> as <strong><span style="color: #000000;">a</span> <span style="color: #000000;">reminder and to wake up people to get THE reflexes</span></strong>, check below, please.</p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-01-00-07.jpg"><img loading="lazy" data-attachment-id="5314" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/screenhunter_09-sep-01-00-07/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-01-00-07.jpg" data-orig-size="442,598" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="#FSCD" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-01-00-07.jpg?w=222" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-01-00-07.jpg?w=442" class="aligncenter  wp-image-5314" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-01-00-07.jpg?w=601&#038;h=814" alt="#FSCD" width="601" height="814" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-01-00-07.jpg 442w, https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-01-00-07.jpg?w=111&amp;h=150 111w, https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-01-00-07.jpg?w=222&amp;h=300 222w" sizes="(max-width: 601px) 100vw, 601px" /></a></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;">I would feel happy if anybody else would join in to the <strong><span style="color: #000000;">===&gt; #FSCD &lt;===</span></strong> to remind people and to give them good advice, and/or to retweet it, thanks.</p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;">Concerning the <strong><span style="color: #000000;">===&gt; Internet Of Things &lt;===</span></strong> here below my advice. Would be good if discussed&#8230;</p>
<p><span style="color: #ffffff;">.</span></p>
<p><a href="https://gustmees.files.wordpress.com/2014/08/screenhunter_07-aug-31-22-27.jpg"><img loading="lazy" data-attachment-id="5308" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/screenhunter_07-aug-31-22-27/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_07-aug-31-22-27.jpg" data-orig-size="589,555" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="#SecChat #IoT" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_07-aug-31-22-27.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_07-aug-31-22-27.jpg?w=589" class="aligncenter size-full wp-image-5308" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_07-aug-31-22-27.jpg?w=589&#038;h=555" alt="#SecChat #IoT" width="589" height="555" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_07-aug-31-22-27.jpg 589w, https://gustmees.files.wordpress.com/2014/08/screenhunter_07-aug-31-22-27.jpg?w=150&amp;h=141 150w, https://gustmees.files.wordpress.com/2014/08/screenhunter_07-aug-31-22-27.jpg?w=300&amp;h=283 300w" sizes="(max-width: 589px) 100vw, 589px" /></a></p>
<p><span style="color: #ffffff;">.</span></p>
<p>&nbsp;</p>
<p>More about the Internet Of Things:</p>
<ul>
<li><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Curation about the &quot;Internet Of Things&quot;" href="http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things" target="_blank" rel="nofollow">http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things</a></span></span></strong></li>
<li><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Curation about the &quot;Internet Of Things&quot; &amp; Cyber Security" href="http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things" target="_blank" rel="nofollow">http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things</a></span></span></strong></li>
<li><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="WHY is it a MUST to have basic knowledge of Cyber Security ?" href="http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/" target="_blank" rel="nofollow">http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/</a></span></span></strong></li>
</ul>
<p>&nbsp;</p>
<p style="text-align: justify;">And for me the MOST IMPORTANT is to teach <strong><span style="color: #000000;">===&gt; Cyber Hygiene &lt;===</span></strong> in schools and in companies! THE user (us ALL) must have <strong><span style="color: #000000;">basics knowledge of Cyber Security</span></strong> as it is a <strong><span style="color: #000000;">national security issue</span></strong> and also a <strong><span style="color: #000000;">priority</span></strong> for the <strong><span style="color: #000000;">economy</span></strong>!</p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<h2>National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”</h2>
<p><span style="color: #ffffff;">.</span></p>
<p>Check also what <span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="https://cio.gov/national-cybersecurity-awareness-month-advocates-good-cyber-hygiene/" href="https://cio.gov/national-cybersecurity-awareness-month-advocates-good-cyber-hygiene/" target="_blank"><strong>CIO.GOV</strong></a></span></span> An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.</p>
<p><span style="color: #ffffff;">.</span></p>
<p>My curation about <span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Curation about Cyber-Hygiene" href="http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Cyber-Hygiene" target="_blank">Cyber-Hygiene</a></strong></span></span></p>
<ul>
<li style="text-align: justify;"><a title="Cyber-Hygiene" href="https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/</span></span></strong></a></li>
<li style="text-align: justify;">&#8230;</li>
</ul>
<p>I advocate ===&gt; <strong><span style="color: #000000;">CyberHygiene</span></strong> &lt;=== and ===&gt; <strong><span style="color: #000000;">Proactive THINKing</span></strong> &lt;=== since ages and the below action makes me feel happy!</p>
<p><span style="color: #ffffff;">.</span></p>
<p><a href="http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=CDC" target="_blank"><img loading="lazy" data-attachment-id="5346" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/screenhunter_05-sep-02-20-36/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_05-sep-02-20-36.jpg" data-orig-size="422,546" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="CyberHygiene" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_05-sep-02-20-36.jpg?w=232" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_05-sep-02-20-36.jpg?w=422" class="aligncenter wp-image-5346" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_05-sep-02-20-36.jpg?w=600&#038;h=776" alt="CyberHygiene" width="600" height="776" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_05-sep-02-20-36.jpg 422w, https://gustmees.files.wordpress.com/2014/08/screenhunter_05-sep-02-20-36.jpg?w=116&amp;h=150 116w, https://gustmees.files.wordpress.com/2014/08/screenhunter_05-sep-02-20-36.jpg?w=232&amp;h=300 232w" sizes="(max-width: 600px) 100vw, 600px" /></a></p>
<p>&nbsp;</p>
<p><span style="color: #ffffff;">.</span></p>
<p><span style="color: #ffffff;">.</span></p>
<p style="text-align: center;"><strong><span style="color: #000000;">I started ALSO days ago to amplify the word ===&gt; #CyberHygiene &lt;=== by posting each day about it on Twitter, see below! WELCOME to join in 😉</span></strong></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-02-20-49.jpg"><img loading="lazy" data-attachment-id="5350" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/screenhunter_09-sep-02-20-49/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-02-20-49.jpg" data-orig-size="589,206" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Twitter CyberHygiene-1" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-02-20-49.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-02-20-49.jpg?w=589" class="aligncenter size-full wp-image-5350" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-02-20-49.jpg?w=589&#038;h=206" alt="Twitter CyberHygiene-1" width="589" height="206" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-02-20-49.jpg 589w, https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-02-20-49.jpg?w=150&amp;h=52 150w, https://gustmees.files.wordpress.com/2014/08/screenhunter_09-sep-02-20-49.jpg?w=300&amp;h=105 300w" sizes="(max-width: 589px) 100vw, 589px" /></a></p>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/08/screenhunter_08-sep-02-20-49.jpg"><img loading="lazy" data-attachment-id="5351" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/screenhunter_08-sep-02-20-49/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_08-sep-02-20-49.jpg" data-orig-size="587,442" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Twitter CyberHygiene-2" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_08-sep-02-20-49.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_08-sep-02-20-49.jpg?w=587" class="aligncenter size-full wp-image-5351" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_08-sep-02-20-49.jpg?w=587&#038;h=442" alt="Twitter CyberHygiene-2" width="587" height="442" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_08-sep-02-20-49.jpg 587w, https://gustmees.files.wordpress.com/2014/08/screenhunter_08-sep-02-20-49.jpg?w=150&amp;h=113 150w, https://gustmees.files.wordpress.com/2014/08/screenhunter_08-sep-02-20-49.jpg?w=300&amp;h=226 300w" sizes="(max-width: 587px) 100vw, 587px" /></a></p>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/08/screenhunter_07-sep-02-20-48.jpg"><img loading="lazy" data-attachment-id="5352" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/screenhunter_07-sep-02-20-48/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_07-sep-02-20-48.jpg" data-orig-size="589,408" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Twitter CyberHygiene-3" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_07-sep-02-20-48.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_07-sep-02-20-48.jpg?w=589" class="aligncenter size-full wp-image-5352" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_07-sep-02-20-48.jpg?w=589&#038;h=408" alt="Twitter CyberHygiene-3" width="589" height="408" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_07-sep-02-20-48.jpg 589w, https://gustmees.files.wordpress.com/2014/08/screenhunter_07-sep-02-20-48.jpg?w=150&amp;h=104 150w, https://gustmees.files.wordpress.com/2014/08/screenhunter_07-sep-02-20-48.jpg?w=300&amp;h=208 300w" sizes="(max-width: 589px) 100vw, 589px" /></a></p>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2014/08/screenhunter_06-sep-02-20-48.jpg"><img loading="lazy" data-attachment-id="5353" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/screenhunter_06-sep-02-20-48/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_06-sep-02-20-48.jpg" data-orig-size="587,205" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Twitter CyberHygiene-4" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_06-sep-02-20-48.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_06-sep-02-20-48.jpg?w=587" class="aligncenter size-full wp-image-5353" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_06-sep-02-20-48.jpg?w=587&#038;h=205" alt="Twitter CyberHygiene-4" width="587" height="205" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_06-sep-02-20-48.jpg 587w, https://gustmees.files.wordpress.com/2014/08/screenhunter_06-sep-02-20-48.jpg?w=150&amp;h=52 150w, https://gustmees.files.wordpress.com/2014/08/screenhunter_06-sep-02-20-48.jpg?w=300&amp;h=105 300w" sizes="(max-width: 587px) 100vw, 587px" /></a></p>
<p style="text-align: justify;"><span style="color: #ffffff;">.</span></p>
<h2 style="text-align: center;"><strong><span style="color: #000000;">I am convinced about that such actions SHOULD get used to make the users (us ALL) ===&gt; #WakeUP &lt;=== for a more secure internet!</span></strong></h2>
<p>&nbsp;</p>
<p>My curation about:</p>
<ul>
<li><strong><span style="color: #000000;">Cybercrime</span></strong>
<ul>
<li><a title="Cybercrime" href="http://www.scoop.it/t/securite-pc-et-internet/?tag=Cybercrime..." target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">http://www.scoop.it/t/securite-pc-et-internet/?tag=Cybercrime&#8230;</span></span></strong></a></li>
</ul>
</li>
<li><strong><span style="color: #000000;">Data-Breaches</span></strong>
<ul>
<li><a title="Data-Breaches" href="http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">http://www.scoop.it/t/securite-pc-et-internet/?tag=DATA-BREACHES</span></span></strong></a></li>
</ul>
</li>
<li>&#8230;</li>
</ul>
<p>.</p>
<p><a href="https://www.europol.europa.eu/content/expert-international-cybercrime-taskforce-launched-tackle-online-crime" target="_blank"><img loading="lazy" data-attachment-id="5355" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/screenhunter_01-sep-03-11-08/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_01-sep-03-11-08.jpg" data-orig-size="727,389" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="EUROPOL 2014" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_01-sep-03-11-08.jpg?w=300" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_01-sep-03-11-08.jpg?w=727" class="aligncenter wp-image-5355" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_01-sep-03-11-08.jpg?w=600&#038;h=321" alt="EUROPOL 2014" width="600" height="321" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_01-sep-03-11-08.jpg?w=600&amp;h=321 600w, https://gustmees.files.wordpress.com/2014/08/screenhunter_01-sep-03-11-08.jpg?w=150&amp;h=80 150w, https://gustmees.files.wordpress.com/2014/08/screenhunter_01-sep-03-11-08.jpg?w=300&amp;h=161 300w, https://gustmees.files.wordpress.com/2014/08/screenhunter_01-sep-03-11-08.jpg 727w" sizes="(max-width: 600px) 100vw, 600px" /></a></p>
<p style="text-align: center;"> <strong><span style="color: #000000;">Click the image to access the website, please.</span></strong></p>
<p><span style="color: #ffffff;">.</span></p>
<p><a href="https://gustmees.files.wordpress.com/2014/08/economic-impact-of-cybercrime-report-2014.jpg"><img loading="lazy" data-attachment-id="5318" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/economic-impact-of-cybercrime-report-2014/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/economic-impact-of-cybercrime-report-2014.jpg" data-orig-size="467,546" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="economic-impact-of-cybercrime-report-2014" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/economic-impact-of-cybercrime-report-2014.jpg?w=257" data-large-file="https://gustmees.files.wordpress.com/2014/08/economic-impact-of-cybercrime-report-2014.jpg?w=467" class="aligncenter  wp-image-5318" src="https://gustmees.files.wordpress.com/2014/08/economic-impact-of-cybercrime-report-2014.jpg?w=599&#038;h=700" alt="economic-impact-of-cybercrime-report-2014" width="599" height="700" srcset="https://gustmees.files.wordpress.com/2014/08/economic-impact-of-cybercrime-report-2014.jpg 467w, https://gustmees.files.wordpress.com/2014/08/economic-impact-of-cybercrime-report-2014.jpg?w=128&amp;h=150 128w, https://gustmees.files.wordpress.com/2014/08/economic-impact-of-cybercrime-report-2014.jpg?w=257&amp;h=300 257w" sizes="(max-width: 599px) 100vw, 599px" /></a></p>
<p><span style="color: #ffffff;">.</span></p>
<p>Below some examples of Tweets:</p>
<p>&nbsp;</p>
<p style="text-align: justify;">Did YOU take care about YOUR <strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a class="twitter-hashtag pretty-link js-nav" dir="ltr" style="color: #0000ff; text-decoration: underline;" title="Twitter Cyber Hygiene" href="https://twitter.com/hashtag/CyberHygiene?src=hash" target="_blank" data-query-source="hashtag_click"><s>#</s>CyberHygiene</a></span></span></strong> today? Are YOUR <strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a class="twitter-hashtag pretty-link js-nav" dir="ltr" style="color: #0000ff; text-decoration: underline;" title="Twitter #Browsers" href="https://twitter.com/hashtag/Browsers?src=hash" target="_blank" data-query-source="hashtag_click"><s>#</s>Browsers</a></span></span> <span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a class="twitter-hashtag pretty-link js-nav" dir="ltr" style="color: #0000ff; text-decoration: underline;" title="Twitter #Up2Date" href="https://twitter.com/hashtag/Up2Date?src=hash" target="_blank" data-query-source="hashtag_click"><s>#</s>Up2Date</a></span></span></strong>? Check ===&gt; <a title="Browser Security" href="https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/" target="_blank"><span style="color: #0000ff;"><strong><span style="text-decoration: underline;"><span style="text-decoration: underline;">https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/</span></span></strong></span></a> &lt;=== <strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a class="twitter-hashtag pretty-link js-nav" dir="ltr" style="color: #0000ff; text-decoration: underline;" title="Twitter #EdCollCoach" href="https://twitter.com/hashtag/EdCollCoach?src=hash" target="_blank" data-query-source="hashtag_click"><s>#</s>EdCollCoach</a></span></span></strong>  <strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a class="twitter-hashtag pretty-link js-nav" dir="ltr" style="color: #0000ff; text-decoration: underline;" title="Twitter #digcit" href="https://twitter.com/hashtag/digcit?src=hash" target="_blank" data-query-source="hashtag_click"><s>#</s>digcit</a></span></span></strong></p>
<p><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;">DYK: <span style="color: #0000ff;"><strong><span style="text-decoration: underline;"><a class="twitter-hashtag pretty-link js-nav" dir="ltr" style="color: #0000ff; text-decoration: underline;" title="Twitter #ProactiveTHINKing" href="https://twitter.com/hashtag/ProactiveTHINKing?src=hash" target="_blank" data-query-source="hashtag_click"><s>#</s>ProactiveTHINKing</a></span></strong></span> can GET used on 2 ways? 1 way to avoid the worst, another way 2 <strong><span style="color: #000000;">make things happen</span></strong> by <strong><span style="color: #000000;">knowing habits, behavior</span> </strong>😉</p>
<p><span style="color: #ffffff;">.</span></p>
<hr />
<h1>How To Use Curation For Learning and Even Teaching</h1>
<p>I will give you some <strong>visual examples</strong> below who show you, so you can have a direct impression of it. No need to talk too much (what most of the teachers and educators do, sorry…), we go straight to the point…</p>
<p><span style="color: #ffffff;">.</span></p>
<p><a href="http://www.scoop.it/t/securite-pc-et-internet?q=Why+%28And+How%29+Teachers" target="_blank"><img loading="lazy" data-attachment-id="2754" data-permalink="https://gustmees.wordpress.com/2013/04/25/learn-every-day-a-bit-with-curation/screenhunter_01-may-05-14-45/" data-orig-file="https://gustmees.files.wordpress.com/2013/04/screenhunter_01-may-05-14-45.jpg" data-orig-size="459,645" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Curation insight-1" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2013/04/screenhunter_01-may-05-14-45.jpg?w=213" data-large-file="https://gustmees.files.wordpress.com/2013/04/screenhunter_01-may-05-14-45.jpg?w=459" class="aligncenter wp-image-2754 size-full" src="https://gustmees.files.wordpress.com/2013/04/screenhunter_01-may-05-14-45.jpg?w=459&#038;h=645" alt="Curation insight-1" width="459" height="645" srcset="https://gustmees.files.wordpress.com/2013/04/screenhunter_01-may-05-14-45.jpg 459w, https://gustmees.files.wordpress.com/2013/04/screenhunter_01-may-05-14-45.jpg?w=107&amp;h=150 107w, https://gustmees.files.wordpress.com/2013/04/screenhunter_01-may-05-14-45.jpg?w=213&amp;h=300 213w" sizes="(max-width: 459px) 100vw, 459px" /></a></p>
<p style="text-align: justify;">As you can see in the above screenshot, there is some text and also some links linking to similar content… The above screenshot is taken from ===&gt; <strong><span style="text-decoration: underline;"><span style="color: #0000ff;"><a style="color: #0000ff; text-decoration: underline;" title="Why (And How) Teachers and Education should start learning and teaching Cyber-Security" href="http://www.scoop.it/t/securite-pc-et-internet?q=Why+%28And+How%29+Teachers" target="_blank">http://www.scoop.it/t/securite-pc-et-internet?q=Why+%28And+How%29+Teachers</a></span></span> &lt;===</strong></p>
<p><span style="color: #ffffff;">.</span></p>
<hr />
<h1></h1>
<h1><span style="color: #333333;">The Transcript From The Chat</span></h1>
<p>Coming soon,as soon as available&#8230;</p>
<p>.</p>
<p>.</p>
<p>.</p>
<p>..</p>
<p>.</p>
<hr />
<h1>Final word</h1>
<p style="text-align: justify;"><a href="https://gustmees.files.wordpress.com/2011/12/1ibdy1vf6wghd-n05dgl-chaticon01.png"><img loading="lazy" data-attachment-id="125" data-permalink="https://gustmees.wordpress.com/2011/12/29/for-a-better-world-test/1ibdy1vf6wghd-n05dgl-chaticon01/" data-orig-file="https://gustmees.files.wordpress.com/2011/12/1ibdy1vf6wghd-n05dgl-chaticon01.png" data-orig-size="80,80" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="1ibdy1vf6wghd-n05dgl-chaticon01" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2011/12/1ibdy1vf6wghd-n05dgl-chaticon01.png?w=80" data-large-file="https://gustmees.files.wordpress.com/2011/12/1ibdy1vf6wghd-n05dgl-chaticon01.png?w=80" class="alignleft size-full wp-image-125" src="https://gustmees.files.wordpress.com/2011/12/1ibdy1vf6wghd-n05dgl-chaticon01.png?w=80&#038;h=80" alt="chat icon" width="80" height="80" /></a><strong>A security by 100% doesn’t exist and probably NEVER will exist (I am sure about THAT!) , remind the human behavior…, and ALSO  the bugs in programming code of software!</strong></p>
<p style="text-align: justify;">There is one word which any SMB MUST remember ===&gt; <strong>Proactive THINKing</strong> &lt;===, anything is changing that quick that nobody could act mostly in time!</p>
<p>Related articles:</p>
<ul>
<li class="">
<p class="posttitle"><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><strong><a style="color: #0000ff; text-decoration: underline;" title="Permanent Link to Half Of Government Agencies Don’t Address Network Vulnerabilities Proactively" href="http://www.informationsecuritybuzz.com/half-government-agencies-dont-address-network-vulnerabilities-proactively/" target="_blank" rel="bookmark">Half Of Government Agencies Don’t Address Network Vulnerabilities Proactively</a></strong></span></span></p>
</li>
<li class="">…</li>
</ul>
<p style="text-align: justify;">Stay informed about what is happening on a daily base about Cyber-Security to <strong>get prepared for the UNKNOWN!</strong> It’s the letter “<strong>I</strong>” in “<strong>ICT</strong>“, which means “<strong>Information</strong>“! Once NEW information gathered which isn’t known YET by the employees, then comes the letter “<strong>C</strong>“, which means “<strong>Communication</strong>“! Inform YOUR <strong>employees</strong> and <strong>ICT-Staff</strong> as soon as possible, remember that in the “<strong>Security Chain</strong>” <strong>anyone MUST be strong!</strong></p>
<p style="text-align: justify;"><strong>===&gt; THE MOST IMPORTANT when making training is to NOT use TOO MUCH technology words so that the employees might be able to UNDERSTAND! &lt;===</strong></p>
<p>Read my curation:</p>
<ul>
<li class=""><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Curation about Cyber-Security" href="http://www.scoop.it/t/securite-pc-et-internet" target="_blank"><strong>http://www.scoop.it/t/securite-pc-et-internet</strong></a></span></span></li>
</ul>
<p><span style="color: #ffffff;">.</span></p>
<hr />
<h1><span style="color: #000000;">Ideas For A More Secure Internet</span></h1>
<p style="text-align: justify;">Since already 1999 I was publishing online about the risks and Cyber Security and by seeing the unwillingness of people to learn about it I was going for ===&gt; <strong><span style="color: #000000;">#DeepTHINKing</span></strong> &lt;=== about WHAT could get done, here below my <strong><span style="color: #000000;">ideas</span></strong>:</p>
<ul>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Ideas for a more secure Internet-part2/IT-Security Scouts" href="https://gustmees.wordpress.com/2012/05/16/ideas-for-a-more-secure-internet-part2it-security-scouts-in-schools/" target="_blank" rel="bookmark">Ideas for a more secure Internet-part2/IT-Security Scouts</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Ideas for a more secure Internet-part1/National Security Day as a Family Day" href="https://gustmees.wordpress.com/2012/05/16/ideas-for-a-more-secure-internet-part1national-security-day-as-a-family-day/" target="_blank" rel="bookmark">Ideas for a more secure Internet-part1/National Security Day as a Family Day</a></span></span></strong></p>
</li>
<li style="text-align: justify;">
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;"><a style="color: #0000ff; text-decoration: underline;" title="Ideas for a more secure Internet-part3/Dangers of storage devices" href="https://gustmees.wordpress.com/2012/05/17/ideas-for-a-more-secure-internet-part3dangers-of-storage-devices/" target="_blank" rel="bookmark">Ideas for a more secure Internet-part3/Dangers of storage devices</a></span></span></strong></p>
</li>
<li style="text-align: justify;"><a title="Sécurité PC et Internet/Théâtre Interactif et Pédagogique (TIP)" href="http://gustmeesfr.wordpress.com/2011/12/28/securite-pc-et-internettheatre-interactif-et-pedagogique/" target="_blank"><strong><span style="text-decoration: underline;"><span style="color: #0000ff; text-decoration: underline;">Sécurité PC et Internet/Théâtre Interactif et Pédagogique (TIP)</span></span></strong></a></li>
</ul>
<p><span style="color: #ffffff;">.</span></p>
<p>Some of the above ideas could get made into practice in ===&gt; <strong><span style="color: #000000;">#MakerSpaces</span></strong> &lt;=== and/or in ===&gt; <strong><span style="color: #000000;">#Coding places</span></strong> &lt;===, check below, please:</p>
<ul>
<li>
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff;"><a style="color: #0000ff; text-decoration: underline;" title="Maker Space | A New Trend In Education And A BIG Responsibility" href="https://gustmees.wordpress.com/2014/08/20/maker-space-a-new-trend-in-education-and-a-big-responsibility/" target="_blank" rel="bookmark">Maker Space | A New Trend In Education And A BIG Responsibility</a></span></span></strong></p>
</li>
<li>
<p class="title"><strong><span style="text-decoration: underline;"><span style="color: #0000ff;"><a style="color: #0000ff; text-decoration: underline;" title="Coding, A NEW Trend In Education And A BIG Responsibility" href="https://gustmees.wordpress.com/2014/08/24/coding-a-new-trend-in-education-and-a-big-responsibility/" target="_blank" rel="bookmark">Coding, A NEW Trend In Education And A BIG Responsibility</a></span></span></strong></p>
</li>
<li>&#8230;</li>
</ul>
<p><span style="color: #ffffff;">.</span></p>
<p>I encourage my readers and followers from Twitter to be ===&gt; lurkers &lt;=== on the <strong><span style="color: #000000;">#SecChat</span></strong> to learn about it, thanks.</p>
<p><span style="color: #ffffff;">.</span></p>
<p>&nbsp;</p>
<p><a href="https://gustmees.files.wordpress.com/2014/08/screenhunter_05-aug-31-20-36.jpg"><img loading="lazy" data-attachment-id="5306" data-permalink="https://gustmees.wordpress.com/2014/08/29/twitter-chat-the-economic-impact-of-cybercrime/screenhunter_05-aug-31-20-36/" data-orig-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_05-aug-31-20-36.jpg" data-orig-size="533,563" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="#SecChat" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_05-aug-31-20-36.jpg?w=284" data-large-file="https://gustmees.files.wordpress.com/2014/08/screenhunter_05-aug-31-20-36.jpg?w=533" class="aligncenter size-full wp-image-5306" src="https://gustmees.files.wordpress.com/2014/08/screenhunter_05-aug-31-20-36.jpg?w=533&#038;h=563" alt="#SecChat" width="533" height="563" srcset="https://gustmees.files.wordpress.com/2014/08/screenhunter_05-aug-31-20-36.jpg 533w, https://gustmees.files.wordpress.com/2014/08/screenhunter_05-aug-31-20-36.jpg?w=142&amp;h=150 142w, https://gustmees.files.wordpress.com/2014/08/screenhunter_05-aug-31-20-36.jpg?w=284&amp;h=300 284w" sizes="(max-width: 533px) 100vw, 533px" /></a></p>
<p><span style="color: #ffffff;">.</span></p>
<p style="text-align: justify;"><strong><span style="color: #333333;">Keywords necessary for me to create this blog post:</span></strong> economy, CyberSecurity, CyberCrime, InternetSafety, NAIVETY, Ignorance, data loss, data breaches, reputation, confidence, trust, intellectual property, <strong><span style="color: #000000;">CyberHygiene</span></strong>, <strong><span style="color: #000000;">RESPONSIBILITY</span></strong>, <strong><span style="color: #000000;">Proactive Thinking</span></strong>,</p>
<p><span style="color: #ffffff;">.</span></p>
<p>&nbsp;</p>
<table border="1" width="100%">
<tbody>
<tr>
<td><a href="https://gustmees.files.wordpress.com/2014/07/gust-avril2014-800px-21.jpg"><img data-attachment-id="4582" data-permalink="https://gustmees.wordpress.com/2014/07/10/education-collaboration-and-coaching-the-future/gust-avril2014-800px-2/" data-orig-file="https://gustmees.files.wordpress.com/2014/07/gust-avril2014-800px-21.jpg" data-orig-size="582,723" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="GUST-AVRIL2014-800px-2" data-image-description="" data-medium-file="https://gustmees.files.wordpress.com/2014/07/gust-avril2014-800px-21.jpg?w=241" data-large-file="https://gustmees.files.wordpress.com/2014/07/gust-avril2014-800px-21.jpg?w=582" class="alignleft size-thumbnail wp-image-4582" src="https://gustmees.files.wordpress.com/2014/07/gust-avril2014-800px-21.jpg?w=119&#038;h=150" alt="GUST-AVRIL2014-800px-2" /></a><span style="color: #ffffff;"><span style="color: #ffffff;">.</span></span></p>
<p style="text-align: justify;">L’auteur <strong>Gust MEES</strong> est <strong>Formateur andragogique / pédagogique TIC</strong>, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant <strong><a title="BEESECURE (LU)" href="http://www.bee-secure.lu/" target="_blank">BEESECURE</a>, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”</strong><strong><a title="MySecureIT (LU)" href="http://www.myschool.lu/home/mS/publications_fiches.asp" target="_blank">MySecureIT</a></strong>“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”<a title="CASES (LU)" href="http://www.cases.lu/" target="_blank"><strong>CASES</strong></a>” (<strong>C</strong>yberworld<strong> A</strong>wareness and<strong> </strong><strong>S</strong>ecurity<strong> </strong><strong>E</strong>nhancement<strong> </strong><strong>S</strong>tructure).</p>
<p>.</p>
<hr />
<p style="text-align: justify;">The author <strong>Gust MEES</strong> is <strong>ICT Course Instructor</strong>, ”<strong>Member of the Advisory Board</strong>” from <strong>“Luxembourg Safer Internet</strong>” (LuSI), <a title="BEESECURE (LU)" href="http://www.bee-secure.lu/" target="_blank"><strong>BEESECURE</strong></a>, Official Partner (Consultant) from the <strong>Ministry of Education in Luxembourg</strong>, project “<strong><a title="MySecureIT (LU)" href="http://www.myschool.lu/home/mS/publications_fiches.asp" target="_blank">MySecureIT</a></strong>“, Official Partner from the <strong>Ministry of Commerce in Luxembourg</strong>, project “<a title="CASES (LU)" href="http://www.cases.lu/" target="_blank"><strong>CASES</strong></a>” (<strong>C</strong>yberworld<strong> A</strong>wareness and <strong>S</strong>ecurity <strong>E</strong>nhancement <strong>S</strong>tructure).</p>
</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p><span style="color: #ffffff;">.</span></p>
<p>Stay tuned for next blog post(s) 😉</p>
<p><span style="color: #ffffff;">.</span></p>
<p><span style="color: #ffffff;">.</span></p>
]]></html><thumbnail_url><![CDATA[https://gustmees.files.wordpress.com/2012/05/screenhunter_02-may-02-19-02-e1402099610109.jpg?fit=440%2C330]]></thumbnail_url><thumbnail_width><![CDATA[440]]></thumbnail_width><thumbnail_height><![CDATA[317]]></thumbnail_height></oembed>