Changes

Jump to navigation Jump to search
no edit summary
Line 79: Line 79:  
*Restrict access to what the social media application can access such as disabling access to the camera, phone call log, text messages, etc... if possible.
 
*Restrict access to what the social media application can access such as disabling access to the camera, phone call log, text messages, etc... if possible.
 
*Be smart! Think about what is being posted. Don't post something that you wouldn't feel comfortable yelling on the street or in a public place.
 
*Be smart! Think about what is being posted. Don't post something that you wouldn't feel comfortable yelling on the street or in a public place.
 +
 +
==Networking Devices and Internet Appliances==
 +
===Cloud Services===
 +
Cloud providers offer services that allow file storage, compute power, e-mail, office tools, and remote access (to name a few), which can be accessed remotely by logging into a control panel or server.
 +
 +
Best practices when using these services include: encrypting sensitive data, use anti-malware and backup services provided by the cloud service provider (CSP), inquire on where the data is being physically stored.
 +
 +
For more best practices and information on protecting a cloud environment visit the Cloud Security Initiative page on GCpedia.
       
|}
 
|}

Navigation menu

GCwiki