Page 17 - AO3QT2020CL
P. 17

4 Use Use SSL or or TLS connections 5 Use Use two factor authentications (2FA) to to verify system
access 6 Do not have employees conduct personal activities on on on laptops which lack physical security Example: social media posts answering personal emails 7 Always insist employees keep devices on themselves and securely store them them when not in in in use 8 Remind employees to to hide their their work so no no no one can see their their screen and do not leave devices unattended 

































































































   15   16   17   18   19