Security Guideline
IoT Security Guideline for Digital Signage
Contents
Introduction
Potential Threats
Architecture of Digital Signage System
Application Layer
Management Layer
Network Layer
Device Layer
Security Best Practice
Application Layer
Management Layer
Network Layer
Device Layer
Conclusion and...
Release Date: 27 Sep 2024
1897 Views
Comprehensive Guide to Social Media Scams: Setting up Defense to Safeguard Your Personal Information
Social media has become a necessary part of people's daily lives, but it has also attracted the attention of unscrupulous individuals. The Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) reminds the public to be cautious of social media scams and to always...
Release Date: 18 Aug 2023
4130 Views
Incident Response Guideline for SMEs
Cyber attacks evolve rapidly as the costs and efforts required for hackers to launch attacks are decreasing due to the development of automation and computing powers. This leads to increased cyber attacks targeting different organisations (including public or private, multinational or local organisations). As most small...
Release Date: 29 Jul 2022
15784 Views
Cloud Storage Security
In light of the rapid development of the Internet and the popularity of mobile devices, the demand in cloud storage continuously increases. Cloud storage has no geographical restriction, making the service available around the globe; plus that the requirement in information security differs in every country...
Release Date: 31 May 2022
13344 Views
Data Protection Guideline
The recent incidents of personal information leakage have attracted much public attention. Have you been worrying about your own data privacy? Do you know what risks are associated with storing data on the computer? What measures are available to mitigate these risks? This guideline is divided...
Release Date: 6 May 2022
16267 Views
Personal VPN Security Guideline
Objective
Virtual private network (VPN) is one of the commonly used security technologies that have been widely used in an enterprise environment for employee remote access. On the other hand, it is also applied in protecting personal online privacy and security, which is known...
Release Date: 24 Nov 2020
11475 Views
Enterprise VPN Security Guideline
The Enterprise VPN is a common technology to support remote working during global pandemic outbreak. However, adopting enterprise VPN without proper risk assessment and corresponding mitigation measures could lead to a security incident. It is common to find that cyber-attacks targeting enterprise VPN appliances, ...
Release Date: 9 Nov 2020
10122 Views
IoT Device (ZigBee) Security Study
Industries all over the world are keeping up with the trend of Internet of Things (IoT), by developing and applying products with built-in IoT-related function. ZigBee, as one of the wireless technologies with low-power consumption and a simple set-...
Release Date: 8 May 2020
7196 Views
10 measures to secure Zoom Meetings
Due to the global outbreak of COVID-19, many companies and education institutes have arranged staff and teachers to work or teach from home, resulting in more people using web meeting software for communication. With its ease of use and rich features, Zoom has been...
Release Date: 3 Apr 2020
9511 Views
Assessing the Security of Remote Access Services Guideline
Remote access services enable workers of a company to access corporate IT services and their work files anytime, anywhere. When opting to use remote access services, a company must consider the security strength and weakness of different solutions, besides their user-friendliness and cost. ...
Release Date: 3 Apr 2020
8081 Views