Changes

Jump to navigation Jump to search
no edit summary
Line 31: Line 31:     
==Device Security Recommendations==
 
==Device Security Recommendations==
Using personal devices when working in an unclassified and non-sensitive environment is encouraged, however employee's should keep in mind best practices and recommendations when using these devices. Some of these include:
+
Using personal devices when working in an unclassified and non-sensitive environment is encouraged, however employee's should keep in mind best practices and recommendations when using these devices.  
   −
*
+
Some general ways to protect personal devices of any kind include:
 +
*Lock device with a strong password, PIN or bio-metric if applicable.
 +
*Apply updates to software applications and operating systems regularly.
 +
*Do not leave devices unattended especially in public places.
 +
*Avoid installing non-approved apps.
 +
*Disable or avoid using the "remember me" feature for password and credential storing.
 +
*Avoid using free charging stations.
 +
*Be aware of your surroundings.
       +
===Smartphones and related mobile devices===
 +
Smartphones enable us to have a direct connection to conferences, team meetings and collaboration applications. If left unprotected, devices can become and easy target for malicious actors.
 
   
 
   
    
|}
 
|}

Navigation menu

GCwiki