Settings
Language
Color Theme
What is Device Security?
Device security refers to the measures taken to protect devices, such as computers, smartphones, and internet-connected devices, from cyber threats and unauthorized access.
What is Device Security?
Device security refers to the measures taken to protect devices, such as computers, smartphones, and internet-connected devices, from cyber threats and unauthorized access. This includes protecting devices from malware, hacking, and physical access.
View Options Again
Refers to the protection of virtualized computing (e.g., Virtual Machines).
Refers to the protection of intellectual property.
Refers to the protection of devices, such as computers and smartphones.
Refers to the protection of people and premises.
Securing devices from physical access
Protecting devices from physical access is crucial because it can allow an attacker or criminal to gain access to sensitive data or install malware on the device.
Lock devices when not in use
Protect devices from theft
Use privacy screens
Use password protection or biometric authentication to lock devices when they are not in use. This will prevent unauthorized individuals from accessing the device if it is left unattended.
Keep devices with you at all times when traveling, or secure them in a safe location when not in use. Consider using a lock or cable to physically secure devices to a stationary object.
Privacy screens can help prevent someone from seeing your screen when you are working in public places or when your device is left unattended. They do this by using a polarised sheet to restrict the viewing angle to approx. 30 degrees on either side. This can help to protect your data from being viewed by unauthorized parties.
Is the following statement True or False:
Privacy screens help to prevent someone sitting next to you from viewing your screen.
Privacy screens can help prevent someone from seeing your screen when you are working in public places or when your device is left unattended. They do this by using a polarised sheet to restrict the viewing angle to approx. 30 degrees on either side. This can help to protect your data from being viewed by unauthorized parties.
View Options Again
True
False
Protecting devices from malware
Malware can include viruses, trojans, adware, worms, ransomware, and spyware. Once infected, malware can steal, modify, or prevent access to your data on your devices. To protect our devices from malware, we need to do the following:
Install antivirus software
Keep devices up to date
Spot the phish
Antivirus software can help to detect and remove software performing potentially unwanted actions such as logging keystrokes, injecting malicious advertisements, installing ransomware or using the device as part of a network of other compromised devices, also known as a botnet.
Installing the latest security updates and patches can help to protect devices from known vulnerabilities and prevent malware infections through unexpected avenues (e.g., simply receiving a message or opening a website if a device has vulnerabilities could lead to a compromise).
Be cautious when opening emails, clicking on links, or downloading files from unknown sources. These can often contain malware or lead to malicious websites. Instead, only download files from trusted sources and be mindful of the emails and links you click on.
To protect a device against malware infections, you should.
Installing the latest security updates and patches can help to protect devices from known vulnerabilities and prevent malware infections through unexpected avenues (e.g., simply receiving a message or opening a website if a device has vulnerabilities could lead to a compromise).
View Options Again
Don't install antivirus software because it'll slow down your device.
Keep devices up to date.
None of the options are correct.
Click on links or attachments in any email you receive.
Types of home and work devices
Any device connected to a home or work network, such as routers, IoT devices, or smart home devices, may expose the entirety of a network to cyber threats. To protect these devices, we should:
Protect smart home devices
Protect IoT devices
Protect routers
Secure smart home devices with strong, unique passwords and enable two-factor authentication whenever possible. Be cautious about the information shared with smart home devices, as this information can potentially be accessed by unauthorized parties.
Many IoT devices have security vulnerabilities that can be exploited by hackers. Keep IoT devices up to date with the latest security patches and updates, and consider disabling any unnecessary features or ports to reduce the risk of a cyber attack.
Keep routers and other network-connected devices, such as modems and switches, secure with strong passwords and periodic updates. Consider enabling WPA3 encryption for Wi-Fi networks to protect against unauthorized access.
Is the following statement True or False:
A compromised device can be used to onward attack another device on the same network.
Any device connected to a home or work network, such as routers, IoT devices, or smart home devices, may expose the entirety of a network to cyber threats. These can include smart home devices, IoT devices, routers, and other network-connected devices such as modems and switches.
View Options Again
True
False
Device network security
Avoid using public Wi-Fi networks. Other users on these networks can potentially intercept your traffic and steal sensitive information. If you must, ensure you're using a Virtual Private Network (VPN) at all times.
Is the following statement True or False:
Connecting to public Wi-Fi networks is safe if you just avoid clicking links in suspicious emails.
Attackers who control a public Wi-Fi network can intercept your traffic and potentially steal sensitive information. We should avoid using public Wi-Fi networks wherever possible, but if there's no alternative, we need to ensure a VPN is in use at all times to encrypt all traffic going in and out of the device.
View Options Again
True
False
Wrapping up
Protecting devices from cyber criminals requires a defense-in-depth approach to ensure the devices are physically secure, operate on secure networks, and are able to prevent the execution of malware.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Device-Security
[88, "Device-Security", "Device-Security"],
What is Device Security?
[89, "What is Device Security?", "What is Device Security?"],
Device security refers to the measures taken to protect devices, such as computers, smartphones, and internet-connected devices, from cyber threats and unauthorized access.
[90, "Device security refers to the measures taken to protect devices, such as computers, smartphones, and internet-connected devices, from cyber threats and unauthorized access.", "Device security refers to the measures taken to protect devices, such as computers, smartphones, and internet-connected devices, from cyber threats and unauthorized access."],
What is Device Security?
[91, "What is Device Security?", "What is Device Security?"],
Refers to the protection of devices, such as computers and smartphones.
[92, "Refers to the protection of devices, such as computers and smartphones.", "Refers to the protection of devices, such as computers and smartphones."],
Refers to the protection of virtualized computing (e.g., Virtual Machines).
[93, "Refers to the protection of virtualized computing (e.g., Virtual Machines).", "Refers to the protection of virtualized computing (e.g., Virtual Machines)."],
Refers to the protection of people and premises.
[94, "Refers to the protection of people and premises.", "Refers to the protection of people and premises."],
Refers to the protection of intellectual property.
[95, "Refers to the protection of intellectual property.", "Refers to the protection of intellectual property."],
Device security refers to the measures taken to protect devices, such as computers, smartphones, and internet-connected devices, from cyber threats and unauthorized access. This includes protecting devices from malware, hacking, and physical access.
[96, "Device security refers to the measures taken to protect devices, such as computers, smartphones, and internet-connected devices, from cyber threats and unauthorized access. This includes protecting devices from malware, hacking, and physical access.", "Device security refers to the measures taken to protect devices, such as computers, smartphones, and internet-connected devices, from cyber threats and unauthorized access. This includes protecting devices from malware, hacking, and physical access."],
Securing devices from physical access
[97, "Securing devices from physical access", "Securing devices from physical access"],
Protecting devices from physical access is crucial because it can allow an attacker or criminal to gain access to sensitive data or install malware on the device.
[98, "Protecting devices from physical access is crucial because it can allow an attacker or criminal to gain access to sensitive data or install malware on the device.", "Protecting devices from physical access is crucial because it can allow an attacker or criminal to gain access to sensitive data or install malware on the device."],
Lock devices when not in use
[99, "Lock devices when not in use", "Lock devices when not in use"],
Use password protection or biometric authentication to lock devices when they are not in use. This will prevent unauthorized individuals from accessing the device if it is left unattended.
[100, "Use password protection or biometric authentication to lock devices when they are not in use. This will prevent unauthorized individuals from accessing the device if it is left unattended.", "Use password protection or biometric authentication to lock devices when they are not in use. This will prevent unauthorized individuals from accessing the device if it is left unattended."],
Protect devices from theft
[101, "Protect devices from theft", "Protect devices from theft"],
Keep devices with you at all times when traveling, or secure them in a safe location when not in use. Consider using a lock or cable to physically secure devices to a stationary object.
[102, "Keep devices with you at all times when traveling, or secure them in a safe location when not in use. Consider using a lock or cable to physically secure devices to a stationary object.", "Keep devices with you at all times when traveling, or secure them in a safe location when not in use. Consider using a lock or cable to physically secure devices to a stationary object."],
Use privacy screens
[103, "Use privacy screens", "Use privacy screens"],
Privacy screens can help prevent someone from seeing your screen when you are working in public places or when your device is left unattended. They do this by using a polarised sheet to restrict the viewing angle to approx. 30 degrees on either side. This can help to protect your data from being viewed by unauthorized parties.
[104, "Privacy screens can help prevent someone from seeing your screen when you are working in public places or when your device is left unattended. They do this by using a polarised sheet to restrict the viewing angle to approx. 30 degrees on either side. This can help to protect your data from being viewed by unauthorized parties.", "Privacy screens can help prevent someone from seeing your screen when you are working in public places or when your device is left unattended. They do this by using a polarised sheet to restrict the viewing angle to approx. 30 degrees on either side. This can help to protect your data from being viewed by unauthorized parties."],
Privacy screens help to prevent someone sitting next to you from viewing your screen.
[105, "Privacy screens help to prevent someone sitting next to you from viewing your screen.", "Privacy screens help to prevent someone sitting next to you from viewing your screen."],
Privacy screens can help prevent someone from seeing your screen when you are working in public places or when your device is left unattended. They do this by using a polarised sheet to restrict the viewing angle to approx. 30 degrees on either side. This can help to protect your data from being viewed by unauthorized parties.
[106, "Privacy screens can help prevent someone from seeing your screen when you are working in public places or when your device is left unattended. They do this by using a polarised sheet to restrict the viewing angle to approx. 30 degrees on either side. This can help to protect your data from being viewed by unauthorized parties.", "Privacy screens can help prevent someone from seeing your screen when you are working in public places or when your device is left unattended. They do this by using a polarised sheet to restrict the viewing angle to approx. 30 degrees on either side. This can help to protect your data from being viewed by unauthorized parties."],
Protecting devices from malware
[107, "Protecting devices from malware", "Protecting devices from malware"],
Malware can include viruses, trojans, adware, worms, ransomware, and spyware. Once infected, malware can steal, modify, or prevent access to your data on your devices. To protect our devices from malware, we need to do the following:
[108, "Malware can include viruses, trojans, adware, worms, ransomware, and spyware. Once infected, malware can steal, modify, or prevent access to your data on your devices. To protect our devices from malware, we need to do the following:", "Malware can include viruses, trojans, adware, worms, ransomware, and spyware. Once infected, malware can steal, modify, or prevent access to your data on your devices. To protect our devices from malware, we need to do the following:"],
Install antivirus software
[109, "Install antivirus software", "Install antivirus software"],
Antivirus software can help to detect and remove software performing potentially unwanted actions such as logging keystrokes, injecting malicious advertisements, installing ransomware or using the device as part of a network of other compromised devices, also known as a botnet.
[110, "Antivirus software can help to detect and remove software performing potentially unwanted actions such as logging keystrokes, injecting malicious advertisements, installing ransomware or using the device as part of a network of other compromised devices, also known as a botnet.", "Antivirus software can help to detect and remove software performing potentially unwanted actions such as logging keystrokes, injecting malicious advertisements, installing ransomware or using the device as part of a network of other compromised devices, also known as a botnet."],
Keep devices up to date
[111, "Keep devices up to date", "Keep devices up to date"],
Installing the latest security updates and patches can help to protect devices from known vulnerabilities and prevent malware infections through unexpected avenues (e.g., simply receiving a message or opening a website if a device has vulnerabilities could lead to a compromise).
[112, "Installing the latest security updates and patches can help to protect devices from known vulnerabilities and prevent malware infections through unexpected avenues (e.g., simply receiving a message or opening a website if a device has vulnerabilities could lead to a compromise).", "Installing the latest security updates and patches can help to protect devices from known vulnerabilities and prevent malware infections through unexpected avenues (e.g., simply receiving a message or opening a website if a device has vulnerabilities could lead to a compromise)."],
Spot the phish
[113, "Spot the phish", "Spot the phish"],
Be cautious when opening emails, clicking on links, or downloading files from unknown sources. These can often contain malware or lead to malicious websites. Instead, only download files from trusted sources and be mindful of the emails and links you click on.
[114, "Be cautious when opening emails, clicking on links, or downloading files from unknown sources. These can often contain malware or lead to malicious websites. Instead, only download files from trusted sources and be mindful of the emails and links you click on.", "Be cautious when opening emails, clicking on links, or downloading files from unknown sources. These can often contain malware or lead to malicious websites. Instead, only download files from trusted sources and be mindful of the emails and links you click on."],
To protect a device against malware infections, you should.
[115, "To protect a device against malware infections, you should.", "To protect a device against malware infections, you should."],
Keep devices up to date.
[116, "Keep devices up to date.", "Keep devices up to date."],
Click on links or attachments in any email you receive.
[117, "Click on links or attachments in any email you receive.", "Click on links or attachments in any email you receive."],
Don't install antivirus software because it'll slow down your device.
[118, "Don't install antivirus software because it'll slow down your device.", "Don't install antivirus software because it'll slow down your device."],
None of the options are correct.
[119, "None of the options are correct.", "None of the options are correct."],
Installing the latest security updates and patches can help to protect devices from known vulnerabilities and prevent malware infections through unexpected avenues (e.g., simply receiving a message or opening a website if a device has vulnerabilities could lead to a compromise).
[120, "Installing the latest security updates and patches can help to protect devices from known vulnerabilities and prevent malware infections through unexpected avenues (e.g., simply receiving a message or opening a website if a device has vulnerabilities could lead to a compromise).", "Installing the latest security updates and patches can help to protect devices from known vulnerabilities and prevent malware infections through unexpected avenues (e.g., simply receiving a message or opening a website if a device has vulnerabilities could lead to a compromise)."],
Types of home and work devices
[121, "Types of home and work devices", "Types of home and work devices"],
Any device connected to a home or work network, such as routers, IoT devices, or smart home devices, may expose the entirety of a network to cyber threats. To protect these devices, we should:
[122, "Any device connected to a home or work network, such as routers, IoT devices, or smart home devices, may expose the entirety of a network to cyber threats. To protect these devices, we should:", "Any device connected to a home or work network, such as routers, IoT devices, or smart home devices, may expose the entirety of a network to cyber threats. To protect these devices, we should:"],
Protect smart home devices
[123, "Protect smart home devices", "Protect smart home devices"],
Secure smart home devices with strong, unique passwords and enable two-factor authentication whenever possible. Be cautious about the information shared with smart home devices, as this information can potentially be accessed by unauthorized parties.
[124, "Secure smart home devices with strong, unique passwords and enable two-factor authentication whenever possible. Be cautious about the information shared with smart home devices, as this information can potentially be accessed by unauthorized parties.", "Secure smart home devices with strong, unique passwords and enable two-factor authentication whenever possible. Be cautious about the information shared with smart home devices, as this information can potentially be accessed by unauthorized parties."],
Protect IoT devices
[125, "Protect IoT devices", "Protect IoT devices"],
Many IoT devices have security vulnerabilities that can be exploited by hackers. Keep IoT devices up to date with the latest security patches and updates, and consider disabling any unnecessary features or ports to reduce the risk of a cyber attack.
[126, "Many IoT devices have security vulnerabilities that can be exploited by hackers. Keep IoT devices up to date with the latest security patches and updates, and consider disabling any unnecessary features or ports to reduce the risk of a cyber attack.", "Many IoT devices have security vulnerabilities that can be exploited by hackers. Keep IoT devices up to date with the latest security patches and updates, and consider disabling any unnecessary features or ports to reduce the risk of a cyber attack."],
Protect routers
[127, "Protect routers", "Protect routers"],
Keep routers and other network-connected devices, such as modems and switches, secure with strong passwords and periodic updates. Consider enabling WPA3 encryption for Wi-Fi networks to protect against unauthorized access.
[128, "Keep routers and other network-connected devices, such as modems and switches, secure with strong passwords and periodic updates. Consider enabling WPA3 encryption for Wi-Fi networks to protect against unauthorized access.", "Keep routers and other network-connected devices, such as modems and switches, secure with strong passwords and periodic updates. Consider enabling WPA3 encryption for Wi-Fi networks to protect against unauthorized access."],
A compromised device can be used to onward attack another device on the same network.
[129, "A compromised device can be used to onward attack another device on the same network.", "A compromised device can be used to onward attack another device on the same network."],
Any device connected to a home or work network, such as routers, IoT devices, or smart home devices, may expose the entirety of a network to cyber threats. These can include smart home devices, IoT devices, routers, and other network-connected devices such as modems and switches.
[130, "Any device connected to a home or work network, such as routers, IoT devices, or smart home devices, may expose the entirety of a network to cyber threats. These can include smart home devices, IoT devices, routers, and other network-connected devices such as modems and switches.", "Any device connected to a home or work network, such as routers, IoT devices, or smart home devices, may expose the entirety of a network to cyber threats. These can include smart home devices, IoT devices, routers, and other network-connected devices such as modems and switches."],
Device network security
[131, "Device network security", "Device network security"],
Avoid using public Wi-Fi networks. Other users on these networks can potentially intercept your traffic and steal sensitive information. If you must, ensure you're using a Virtual Private Network (VPN) at all times.
[132, "Avoid using public Wi-Fi networks. Other users on these networks can potentially intercept your traffic and steal sensitive information. If you must, ensure you're using a Virtual Private Network (VPN) at all times.", "Avoid using public Wi-Fi networks. Other users on these networks can potentially intercept your traffic and steal sensitive information. If you must, ensure you're using a Virtual Private Network (VPN) at all times."],
Connecting to public Wi-Fi networks is safe if you just avoid clicking links in suspicious emails.
[133, "Connecting to public Wi-Fi networks is safe if you just avoid clicking links in suspicious emails.", "Connecting to public Wi-Fi networks is safe if you just avoid clicking links in suspicious emails."],
Attackers who control a public Wi-Fi network can intercept your traffic and potentially steal sensitive information. We should avoid using public Wi-Fi networks wherever possible, but if there's no alternative, we need to ensure a VPN is in use at all times to encrypt all traffic going in and out of the device.
[134, "Attackers who control a public Wi-Fi network can intercept your traffic and potentially steal sensitive information. We should avoid using public Wi-Fi networks wherever possible, but if there's no alternative, we need to ensure a VPN is in use at all times to encrypt all traffic going in and out of the device.", "Attackers who control a public Wi-Fi network can intercept your traffic and potentially steal sensitive information. We should avoid using public Wi-Fi networks wherever possible, but if there's no alternative, we need to ensure a VPN is in use at all times to encrypt all traffic going in and out of the device."],
Wrapping up
[135, "Wrapping up", "Wrapping up"],
Protecting devices from cyber criminals requires a defense-in-depth approach to ensure the devices are physically secure, operate on secure networks, and are able to prevent the execution of malware.
[136, "Protecting devices from cyber criminals requires a defense-in-depth approach to ensure the devices are physically secure, operate on secure networks, and are able to prevent the execution of malware.", "Protecting devices from cyber criminals requires a defense-in-depth approach to ensure the devices are physically secure, operate on secure networks, and are able to prevent the execution of malware."],
[137, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.