Difference between revisions of "Secure Remote Working - Device Considerations"
Line 31: | Line 31: | ||
==Device Security Recommendations== | ==Device Security Recommendations== | ||
− | Using personal devices when working in an unclassified and non-sensitive environment is encouraged, however employee's should keep in mind best practices and recommendations when using these devices. | + | Using personal devices when working in an unclassified and non-sensitive environment is encouraged, however employee's should keep in mind best practices and recommendations when using these devices. |
− | * | + | Some general ways to protect personal devices of any kind include: |
+ | *Lock device with a strong password, PIN or bio-metric if applicable. | ||
+ | *Apply updates to software applications and operating systems regularly. | ||
+ | *Do not leave devices unattended especially in public places. | ||
+ | *Avoid installing non-approved apps. | ||
+ | *Disable or avoid using the "remember me" feature for password and credential storing. | ||
+ | *Avoid using free charging stations. | ||
+ | *Be aware of your surroundings. | ||
+ | ===Smartphones and related mobile devices=== | ||
+ | Smartphones enable us to have a direct connection to conferences, team meetings and collaboration applications. If left unprotected, devices can become and easy target for malicious actors. | ||
|} | |} |
Revision as of 11:30, 22 April 2020
Overview and User Considerations | Technical Considerations | Secure Use of Collaboration Tools | Device Considerations |
---|
BackgroundWith the increase in BYOD (Bring Your Own Device) and remote working, it is important to be mindful of what and how devices are used to conduct business activities. Each type of device be it a router, smartphone, laptop or tablet can be used to remote work which if not properly secured, become a target for compromise. It is important to remember that these devices and the software that runs on them should be used for unclassified and non-sensitive work only. This page will provide some tips and tricks as well as some common risks and security issues that come along with a BYOD model. Risks and Security ConcernsPersonal Devices in an enterprise work environment can create security risk some of which include:
These are a subset of a large list of potential areas of exploitation if a device is not secured adequately. Device Security RecommendationsUsing personal devices when working in an unclassified and non-sensitive environment is encouraged, however employee's should keep in mind best practices and recommendations when using these devices. Some general ways to protect personal devices of any kind include:
Smartphones enable us to have a direct connection to conferences, team meetings and collaboration applications. If left unprotected, devices can become and easy target for malicious actors.
|