Difference between revisions of "Secure Remote Working - Device Considerations"

From wiki
Jump to navigation Jump to search
Line 15: Line 15:
 
With the increase in BYOD (Bring Your Own Device) and remote working, it is important to be mindful of what and how devices are used to conduct business activities. Each type of device be it a router, smartphone, laptop or tablet can be used to remote work which if not properly secured, become a target for compromise.  
 
With the increase in BYOD (Bring Your Own Device) and remote working, it is important to be mindful of what and how devices are used to conduct business activities. Each type of device be it a router, smartphone, laptop or tablet can be used to remote work which if not properly secured, become a target for compromise.  
  
It is important to remember that these devices and the software that runs on them should be used for '''<u>unclassified and non-sensitive work</u>''' only.  
+
It is important to remember that these devices and the software that runs on them should be used for '''<u>unclassified and non-sensitive work</u>''' only.
  
 
This page will provide some tips and tricks as well as some common risks and security issues that come along with a BYOD model.  
 
This page will provide some tips and tricks as well as some common risks and security issues that come along with a BYOD model.  
  
 
|}
 
|}

Revision as of 08:01, 15 April 2020

Telework-nobg.png
Overview and User Considerations Technical Considerations Secure Use of Collaboration Tools Device Considerations

Background

With the increase in BYOD (Bring Your Own Device) and remote working, it is important to be mindful of what and how devices are used to conduct business activities. Each type of device be it a router, smartphone, laptop or tablet can be used to remote work which if not properly secured, become a target for compromise.

It is important to remember that these devices and the software that runs on them should be used for unclassified and non-sensitive work only.

This page will provide some tips and tricks as well as some common risks and security issues that come along with a BYOD model.