Skip to main content

Security Guideline

Filter by:

IoT Security Guideline for Digital Signage

  Contents   Introduction Potential Threats Architecture of Digital Signage System Application Layer Management Layer Network Layer Device Layer Security Best Practice Application Layer Management Layer Network Layer Device Layer Conclusion and...
Release Date: 27 Sep 2024 1892 Views

Comprehensive Guide to Social Media Scams: Setting up Defense to Safeguard Your Personal Information

Social media has become a necessary part of people's daily lives, but it has also attracted the attention of unscrupulous individuals. The Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) reminds the public to be cautious of social media scams and to always...
Release Date: 18 Aug 2023 4125 Views

Incident Response Guideline for SMEs

Cyber attacks evolve rapidly as the costs and efforts required for hackers to launch attacks are decreasing due to the development of automation and computing powers. This leads to increased cyber attacks targeting different organisations (including public or private, multinational or local organisations). As most small...
Release Date: 29 Jul 2022 15778 Views

Cloud Storage Security

In light of the rapid development of the Internet and the popularity of mobile devices, the demand in cloud storage continuously increases. Cloud storage has no geographical restriction, making the service available around the globe; plus that the requirement in information security differs in every country...
Release Date: 31 May 2022 13334 Views

Data Protection Guideline

The recent incidents of personal information leakage have attracted much public attention. Have you been worrying about your own data privacy? Do you know what risks are associated with storing data on the computer? What measures are available to mitigate these risks? This guideline is divided...
Release Date: 6 May 2022 16259 Views

Personal VPN Security Guideline

Objective   Virtual private network (VPN) is one of the commonly used security technologies that have been widely used in an enterprise environment for employee remote access. On the other hand, it is also applied in protecting personal online privacy and security, which is known...
Release Date: 24 Nov 2020 11468 Views

Enterprise VPN Security Guideline

The Enterprise VPN is a common technology to support remote working during global pandemic outbreak. However, adopting enterprise VPN without proper risk assessment and corresponding mitigation measures could lead to a security incident. It is common to find that cyber-attacks targeting enterprise VPN appliances, ...
Release Date: 9 Nov 2020 10117 Views

IoT Device (ZigBee) Security Study

Industries all over the world are keeping up with the trend of Internet of Things (IoT), by developing and applying products with built-in IoT-related function. ZigBee, as one of the wireless technologies with low-power consumption and a simple set-...
Release Date: 8 May 2020 7191 Views

10 measures to secure Zoom Meetings

Due to the global outbreak of COVID-19, many companies and education institutes have arranged staff and teachers to work or teach from home, resulting in more people using web meeting software for communication. With its ease of use and rich features, Zoom has been...
Release Date: 3 Apr 2020 9506 Views

Assessing the Security of Remote Access Services Guideline

Remote access services enable workers of a company to access corporate IT services and their work files anytime, anywhere. When opting to use remote access services, a company must consider the security strength and weakness of different solutions, besides their user-friendliness and cost. ...
Release Date: 3 Apr 2020 8076 Views