YCO A4 Template Portrait 2Col

Total Page:16

File Type:pdf, Size:1020Kb

YCO A4 Template Portrait 2Col

Using Tablets in DCSI Reference Sheet

 If you are uncertain about an app then just Here are some general do a quick Web search. Make sure that the developer and/or publisher has a legitimate tips on using tablets website. Try to find independent reviews or discussions in forums. The more separate Tablet Handling sources you can find on the app, the better.  Store your tablet in a secure location when it Social Networking is not in use.  Popular websites and forums, such as social  Avoid leaving your tablet unattended in a network websites are places where criminals public area or in a motor vehicle. can harvest information about people. These  Where practical, avoid use of free Wi-Fi websites encourage information sharing and access points. They may not be secure. allow you to connect with a wide range of people regardless of their location. When  Be aware when using tablets in busy, public you are on a website that encourages open areas. Check for people looking over your communication, it can be easy to let down shoulder. your guard and provide confidential or personal information that should remain Information Confidentiality private.  Be careful what you post online – don’t give  Public or unrestricted corporate information out too much information about yourself. For may be stored on your tablet device but example, do not include phone numbers, don’t store sensitive corporate information, addresses, your birth date or other personal such as privileged client information. information which could be used to steal  Use secure email methods, such as Outlook your identity. Web Access or the SAGEMS email mobility,  When adding friends to your network, be for corporate information. careful whom you choose to accept. The new ‘friend’ who is outside your social circle Apps may be a criminal looking to gain information about you.  Only download apps from the official app stores (iTunes, Google Play store, Windows  Check the privacy and security settings of store). the social networking website. You may wish to adjust the default settings which usually  Check the terms and conditions of any apps let people have more access than you may before accepting the download. Be wary of wish. apps that ask for access to your messages, contacts or calendar.  Read the privacy policy of the social network website carefully so that you understand how the organisation may use the information.

1 | DCSI Business Technology – Tablet Reference Sheet 25-Apr-18  Beware of hoax e-mails – be alert to offers Security Tips that are ‘too good to be true’ or are designed to ask for money via the Internet.  Set pass-code or PIN protection on and choose a value that is hard to guess. This  Always question messages that come out of will ensure that no-one else can use or view the blue and verify the authenticity through your information Keep your tablet access trusted channels. Do not respond using PIN code confidential. information or links provided in the original message.  Make sure your tablet access PIN is something that's hard for others to guess but  Treat with suspicion any unsolicited e-mail easy for you to remember. that appears to be from your bank or similar institutions.  Set your tablet to automatically lock the screen if unused for more than two minutes.  Regularly clear your web browser storage (cache) – copies of your recent web pages  Enable a suitable remote locating and wiping may contain personal information. facility and understand how to use it if required.  Be aware that hacked (jail-broken) tablets may be exposed to malicious software  Backups – Backup you tablet contents and attacks and will be denied access to the check your settings to see that backups are corporate network. secure.  Be careful not to backup corporate data to Handy Links ‘dropbox’ style web-based storage facilities.  Information Technology Security Guide  Loss or theft - Contact your ICT service desk immediately for assistance with locating the  iPad and tablet basics tablet, or wiping its content.

 Clear your tablet of personal content including email, messages, photos, music and documents before sharing the tablet or transferring to other staff.

 Be careful what you send via email or message. In particular avoid sending personal information, such as account numbers, passwords or other personal information which could be used to steal your identity.

 Keep your tablet software up to date to reduce exposure to malicious software threats.

 Read privacy policies – before you provide personal information to any website, understand how your information will be used and how long it will be retained.

 Be wary of free downloads, programs, software or screensavers. Sometimes malicious software is hidden in free offers.

2 | DCSI Business Technology – Tablet Reference Sheet 22-Jan-13

Recommended publications