Difference between revisions of "Secure Remote Working - Device Considerations"
Line 48: | Line 48: | ||
====Bluetooth==== | ====Bluetooth==== | ||
+ | For devices that have bluetooth capabilities, consider the following: | ||
+ | *Disable bluetooth when not in use. | ||
+ | *Turn off "discovery" or broadcast mode. | ||
+ | *Avoid pairing the device via bluetooth in a public space. | ||
+ | *Do not use bluetooth keyboards to type sensitive text. | ||
+ | *Pair with only recognized devices such as personal headphones or home audio systems. | ||
+ | *For Apple devices, disable the AirDrop feature. | ||
|} | |} |
Revision as of 07:39, 23 April 2020
Overview and User Considerations | Technical Considerations | Secure Use of Collaboration Tools | Device Considerations |
---|
BackgroundWith the increase in BYOD (Bring Your Own Device) and remote working, it is important to be mindful of what and how devices are used to conduct business activities. Each type of device be it a router, smartphone, laptop or tablet can be used to remote work which if not properly secured, become a target for compromise. It is important to remember that these devices and the software that runs on them should be used for unclassified and non-sensitive work only. This page will provide some tips and tricks as well as some common risks and security issues that come along with a BYOD model. Risks and Security ConcernsPersonal Devices in an enterprise work environment can create security risk some of which include:
These are a subset of a large list of potential areas of exploitation if a device is not secured adequately. Device Security RecommendationsUsing personal devices when working in an unclassified and non-sensitive environment is encouraged, however employee's should keep in mind best practices and recommendations when using these devices. Some general ways to protect personal devices of any kind include:
Smartphones enable us to have a direct connection to conferences, team meetings and collaboration applications. If left unprotected, devices can become and easy target for attackers. While there are many mobile devices such as smartphones, smartwatches, tablets, laptops, etc..., each device usually features the same types of communications, security settings, and in some cases share the same operating systems. BluetoothFor devices that have bluetooth capabilities, consider the following:
|