Protection of Mobile Devices
Use devices with care and in alignment with the Information Security Policies
Use of encryption where needed
Use password lock on devices
Being familiar with applicable Information Security policies and procedures
Do not use a device being used by someone else (e.g., someone who does not keep in mind the information security rules)
Do not leave devices unattended
Do not share devices or lock codes with others
Thanks for Read,
Please "SHARE" our post that your friends can read and learn and "COMMENT" us so that we can make our blogbeautiful.
Please Follow us.
Facebook Profile
Google+
facebook Page
Youtube
No comments:
Post a Comment