Line 79:
Line 79:
*Restrict access to what the social media application can access such as disabling access to the camera, phone call log, text messages, etc... if possible.
*Restrict access to what the social media application can access such as disabling access to the camera, phone call log, text messages, etc... if possible.
*Be smart! Think about what is being posted. Don't post something that you wouldn't feel comfortable yelling on the street or in a public place.
*Be smart! Think about what is being posted. Don't post something that you wouldn't feel comfortable yelling on the street or in a public place.
+
+
==Networking Devices and Internet Appliances==
+
===Cloud Services===
+
Cloud providers offer services that allow file storage, compute power, e-mail, office tools, and remote access (to name a few), which can be accessed remotely by logging into a control panel or server.
+
+
Best practices when using these services include: encrypting sensitive data, use anti-malware and backup services provided by the cloud service provider (CSP), inquire on where the data is being physically stored.
+
+
For more best practices and information on protecting a cloud environment visit the Cloud Security Initiative page on GCpedia.
|}
|}