15
Mobile and Remote Best Practices

4 mobile and remote best practices

Embed Size (px)

Citation preview

Mobile and Remote Best Practices

How can you protect your laptop or internet-enabled device?

Password-protect your computer. Keep your valuables with you at all times -

When traveling, keep your device with you.

Downplay your laptop or mobile device - There is no need to advertise to thieves that you have a laptop or mobile device.

Be aware of your surroundings.

Consider an alarm or lock…

Back up your files…

Holiday Traveling with Personal Internet-Enabled Devices Do not use public Wi-Fi networks

Avoid using open Wi-Fi networks to conduct personal business, bank, or shop online.

Turn off Bluetooth when not in use Bluetooth-enabled accessories can be

helpful, such as earpieces for hands-free talking and external keyboards for ease of typing.

Be cautious when charging Avoid connecting your mobile

device to any computer or charging station that you do not control, such as a charging station at an airport terminal or a shared computer at a library.

How can you protect yourself?

Remember physical security…

Keep software up to date…

Use good passwords - Choose devices that allow you to protect your information with passwords.

Disable remote (Bluetooth / NFC / Wi-Fi) connectivity…

Encrypt files - If you are storing personal or corporate information, see if your device offers the option to encrypt the files…

What security risks are associated with USB drives?

Take advantage of security features - Use passwords and encryption on your USB drive to protect your data…

Keep personal and business USB drives separate…

Do not plug an unknown USB drive into your computer - If you find a USB drive, give it to the appropriate authorities (a location's security personnel, your organization's IT department, etc.)…

Disable Autorun - The Autorun feature causes removable media such as CDs, DVDs, and USB drives to open automatically when they are inserted into a drive…

Defending Mobile/Smart Phones and Tablets Against Attack

Follow general guidelines for protecting portable devices…

Be careful about posting your cell phone number and email address… 

Do not follow links sent in email or text messages…

Be wary of downloadable software…