SurvivalRing

Rich Fleetwood on Survival & Preparedness - Founded/Established 1997

TIPS: Stop.Think.Connect. February Update

Stop.Think.Connect. Header

February 2013 Update

In This Issue

  • This Valentine’s Day Share the Love, Not Your Information
  • Digital Learning Day Celebrates the Power of Technology in the Classroom
  • Stop.Think.Connect. Visits Philadelphia in March
  • DHS Spotlight: The National Centers of Academic Excellence in Information Assurance: Helping to Develop Budding Cybersecurity Professionals

Candy HeartsThis Valentine’s Day Share the Love, Not Your InformationLike most holidays, Valentine’s Day traditions have extended to the web. With the click of a button, you can deliver flowers and candy, make reservations at a romantic restaurant, or search for that special someone through an online dating service.[br]
However, as we rely on the Internet more and more in our interpersonal relationships, what steps are you taking to protect your personal information online?In the digital age it’s easy to share information like photos and videos, as well as passwords and account logins, especially in a romantic relationship. According to a new survey by McAfee, more than 50% of people shared their passwords with the person they are in a relationship with and 56% of people snooped on their partner’s social media pages and bank accounts. Only 40% of Americans currently protect their phones with a password.As you celebrate the season of love, remember that sharing isn’t always caring. The Stop.Think.Connect. Campaign offers the following tips to help keep your personal information personal.[br]

 

  • Remember that the Internet is a public resource – Only post information you are comfortable with anyone seeing. This includes information and photos online and via text messaging. Once it’s out of your hands, it’s out of your control.[br]
  • Evaluate your privacy settings – Default settings may allow anyone to see your profile, photos, check-ins, and more, but you can customize your settings to restrict access to only certain people. Sites may change options periodically, so review privacy settings regularly to make sure that your choices are still appropriate.[br]
  • Do not use your primary email address in online submissions – Submitting your email address could result in spam. If you do not want your primary email account flooded with unwanted messages, consider opening an additional email account for use online.[br]
  • Avoid using debit cards for online purchases – Credit cards usually offer some protection against identity theft and may limit the monetary amount you will be responsible for paying.[br]
  • Devote one credit card to online purchases – Consider opening a credit card account for use only online. Keep a minimum credit line on the account to limit the amount of charges an attacker can accumulate.[br]

Visit www.dhs.gov/stopthinkconnect for more cybersecurity resources.[br]


StudentsDigital Learning Day Celebrates the Power of Technology in the Classroom[br]February 6, 2012, marked the second annual Digital Learning Day, a nationwide celebration of innovative teaching and learning through digital media and technology.Stop.Think.Connect. would like to recognize National Network members who promote Digital Learning Day, including the National Association of Secondary School Principals, the National Association of Student Councils, and theNational Honor Society (NASSP/NASC/NHS).

[br]According to the Alliance for Excellent Education’s website, “Digital Learning Day highlights and celebrates successful models, great teaching practices, and effective uses of technology to improve learning for all students.”[br]

A recent PBS survey discovered teachers are embracing digital resources to propel student learning. The survey, conducted by PBS Learning Media, found that seven in 10 teachers (69 %) surveyed said educational technology allows them to “do much more than ever before” for their students.[br]

Three-quarters of educators surveyed linked educational technology to a growing list of benefits, saying it enables them to reinforce and expand on content (74%), motivate students to learn (74%), and respond to a variety of learning styles (73%).[br]

Signifying the growing importance and demand for digital learning strategies in the classroom, nearly 25,000 teachers, millions of students, U.S. Secretary of Education Arne Duncan, U.S. Chief Technology Officer Todd Park, and U.S. Representative George Miller (D-CA) joined the Alliance for Excellent Education to commemorate Digital Learning Day.[br]

Online chats held at www.digitallearningday.org and a digital town hall meeting were a few of the events held to celebrate the power of technology in schools. Parents, public libraries, afterschool leaders, and businesses are a few of the other community members that joined educators in embracing technology to advance educational objectives.[br]

Visit www.digitallearningday.org  for ideas on how to use technology to teach children and teens at home or at school. For cybersecurity tips and resources to help ensure a safer online experience, visitwww.dhs.gov/stopthinkconnect.[br]


Map of PhiladelphiaStop.Think.Connect. Visits Philadelphia Area in MarchThe Stop.Think.Connect. Campaign is working with its National Network partners, including D.A.R.E. AmericaYWCA, andInfraGard, to participate in cybersecurity outreach events for the Philadelphia area in early March.Stop.Think.Connect. increases awareness about the dangers Americans face online through interactive community events that reach Americans of all ages. [br]On March 7, Northampton Community College in Bethlehem, PA will be hosting a cybersecurity awareness session at 11:00 a.m.For more information, e-mail stopthinkconnect@dhs.gov.[br]

GradsThe National Centers of Academic Excellence in Information Assurance: Helping to Develop Budding Cybersecurity ProfessionalsWith 556 million people per year becoming victims of cybercrime, that’s 1.5 million per hour, 18 people per second, and with an estimated annual cost to victims of $110 billion[1], cybercrime costs the world significantly more than the global black market in marijuana, cocaine, and heroin combined.Securing cyberspace means we, as a country, must develop a technologically-skilled workforce, a cyber-savy public, and an effective pipeline of future employees. It will take a national strategy, similar to the effort to upgrade science and mathematics education in the 1950’s, to meet the challenge of securing cyberspace.As a part of this effort, the National Security Agency (NSA) and the Department of Homeland Security (DHS) currently co-sponsor the National Centers of Academic Excellence (CAE) in Information Assurance programs. The overarching goal of these programs is to reduce vulnerability in our national information infrastructure by promoting information assurance and cybersecurity in higher education and research.[br]

Currently, 165 colleges and universities are CAE-designated. To receive a CAE designation, academic institutions or programs must meet stringent requirements that outline what knowledge and skills the students can expect to acquire by graduation. In order to advance the CAE program, NSA and DHS are working to develop a designation in “Information Assurance and Cyber Defense.”[br]

Cyber defense is a growing concern across all sectors, and many CAEs have active research in multiple information assurance and cybersecurity areas, such as threat analysis and counter intelligence, security monitoring, system and network penetration testing, and a number of defensively focused specialties. The Information Assurance and Cyber Defense designation will provide broader flexibility to academic institutions, enabling them to align their curriculum with cybersecurity specializations as they evolve.[br]

The new Information Assurance and Cyber Defense designation is projected to replace the existing designations within two years. Further details about the designation are expected for public release in March 2013. For more information about the CAEs or the new designation, please email askcaeiae@nsa.gov.[br]

[1] Symantec; 2012 Norton Cybercrime Report.[br]


Stop.Think.Connect. Resources

Content Protection by DMCA.com
Updated: March 17, 2013 — 1:42 pm

The Author

Rich Fleetwood

Rich is the founder of SurvivalRing, now in it's 20th year, author of multimedia CDs and DVDs, loves the outdoors, his family, his geeky skill-set, and lives in rural Missouri, just a few miles from the Big Muddy. Always ready to help others, he shares what he learns on multiple blogs, social sites, and more. With a background in preparedness and survival skills, training with county, state, and national organizations, and skills in all areas of media and on air experience in live radio and television, Rich is always thinking about the "big picture", when it comes to helping individuals and families prepare for life's little surprises. Since 1997, he has provided guidance, authentic government survival history, and commentary on why we all need to get ready for that fateful day in the future, when we have to get our hands dirty and step in to save the day. He is an award winning videographer (2005 Telly Award), has received state and national scholarly recognition (2006 New Century Scholar and All USA Academic Team), and is a natural with computers, technology, gadgets, small furry mammals, and anything on wheels. Rich likes making friends, solving problems, and creating solutions to everyday issues. He doesn't mind mixing things up, when there is a teaching moment ready to happen. As a constitutional conservative, he's staying quite busy these days. The SurvivalRing Radio Show at www.survivalringradio.com will be coming back SOON!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Connect With Us at
Twitter Twitter | FaceBook Facebook | LinkedInLinkedIn | Quora Quora | Instagram Instagram | Pinterest Pinterest | Youtube Youtube | Tumblr Tumblr
SurvivalRing © 2018
Contact Us | Advertise | Terms of Use | GDPR | TradeMarks | Privacy | Fair Use | Sitemap | F.T.C
Social Media Disclosure | Earnings Disclaimer | Anti Spam Policy | D.M.C.A.
Site Design by Richard Fleetwood - Founder / Director of SurvivalRing.org
Copyright © 1997-2018 SurvivalRing.org/SurvivalRing Media - All Rights Reserved. -
SurvivalRing is the Trademark (TM) & Service Mark (SM) of all SurvivalRing Media Projects
THIS WEBSITE HOSTED BY SURVIVALRING.ORG - Comments Welcome!