Difference between revisions of "Secure Remote Working - Device Considerations"
Line 66: | Line 66: | ||
*Avoid substituting numbers for letters or symbols. For example, "P@$$W0RD1" is not a secure password. | *Avoid substituting numbers for letters or symbols. For example, "P@$$W0RD1" is not a secure password. | ||
*Enable Two-Factor Authentication (2FA). Choose to authenticate via an "authenticator" app which provides a one-time passcode. Most times SMS is the default second factor however this can be spoofed with a method called sim-swapping. | *Enable Two-Factor Authentication (2FA). Choose to authenticate via an "authenticator" app which provides a one-time passcode. Most times SMS is the default second factor however this can be spoofed with a method called sim-swapping. | ||
− | *Avoid using "remember me" for apps and websites. | + | *Avoid using "remember me" features for apps and websites. |
+ | |||
+ | ==Social Media== | ||
+ | |||
|} | |} |
Revision as of 08:19, 23 April 2020
Overview and User Considerations | Technical Considerations | Secure Use of Collaboration Tools | Device Considerations |
---|
BackgroundWith the increase in BYOD (Bring Your Own Device) and remote working, it is important to be mindful of what and how devices are used to conduct business activities. Each type of device be it a router, smartphone, laptop or tablet can be used to remote work which if not properly secured, become a target for compromise. It is important to remember that these devices and the software that runs on them should be used for unclassified and non-sensitive work only. This page will provide some tips and tricks as well as some common risks and security issues that come along with a BYOD model. Risks and Security ConcernsPersonal Devices in an enterprise work environment can create security risk some of which include:
These are a subset of a large list of potential areas of exploitation if a device is not secured adequately. Device Security RecommendationsUsing personal devices when working in an unclassified and non-sensitive environment is encouraged, however employee's should keep in mind best practices and recommendations when using these devices. Some general ways to protect personal devices of any kind include:
Smartphones enable us to have a direct connection to conferences, team meetings and collaboration applications. If left unprotected, devices can become and easy target for attackers. While there are many mobile devices such as smartphones, smartwatches, tablets, laptops, etc..., each device usually features the same types of communications, security settings, and in some cases share the same operating systems. BluetoothFor devices that have bluetooth capabilities, consider the following:
Authentication on Mobile DevicesThere are multiple ways of securing mobile devices such as using biometrics like a fingerprint or retina scan, and traditional passphrases or PIN numbers. While all of these are better than having no authentication at all, it is important that passphrases are robust, PIN numbers are random and uneasily guessable. An example of what NOT to do is to have your birth year as your PIN. This is easily guessable by the most trivial types of attackers, which can leave your device and data open for attack. When setting up authentication on these devices, consider the following:
Social Media |