Skip to main content

Security Guideline

Filter by:

Six Security Tips for Home Office

With the recent outbreak of novel coronavirus infection, many companies in Hong Kong have arranged their staff to work from home to reduce the risk of spreading the disease in the community. This arrangement presents a new challenge for both the companies and their employees. While advancements...
Release Date: 3 Apr 2020 5788 Views

HKCERT Releases New Study to Raise Security Awareness of Wi-Fi Devices

The applications of the Internet of Things (IoT) are becoming more diverse with the rapid development of wireless technology. Each type of IoT devices need to adopt the appropriate wireless technology to suit its application requirements, with Wi-Fi being the most popular wireless networking...
Release Date: 31 Mar 2020 3327 Views

HKCERT Releases New Study to Raise Security Awareness of Bluetooth Low Energy Devices

The applications of the Internet of Things (IoT) are becoming more diverse with the rapid development of wireless technology. Each type of IoT devices has to adopt the appropriate wireless technology in accordance with their application requirements. Among various wireless technologies, Bluetooth Low Energy (...
Release Date: 9 Mar 2020 3038 Views

HKCERT Released Guideline for Upgrading TLS to Secure Versions

Communication security protocol Transport Layer Security (TLS) ensures data transmission can stand attack of sniffing and data tampering. The protocol has evolved over time with better security and performance. In March of 2020, insecure versions of the protocol TLS 1. and TLS 1....
Release Date: 28 Feb 2020 2887 Views

Implementing IoT Security Best Practice

The adoption of Internet of Things (IoT) technology is a growing trend in various sectors. Startups, small and medium-sized enterprises (SMEs), and other enterprises have started adopting IoT technology to create business values for their products and bring about new customer experience...
Release Date: 14 Jan 2020 4120 Views

IoT Device (Webcam) Security Study

  Background   Today, more and more gadgets, devices and systems are connected to the Internet. Known as the “Internet of Things (IoT)”, this trend has made networked connections more meaningful through greater convergence of people, processes, data and many things else...
Release Date: 24 Jan 2019 8939 Views

Best Practice Guide of Remote Desktop (for corporate administrator)

Remote Desktop is a useful tool for remote control a computer, but misconfigured Remote Desktop is risky. Using weak password to protect Internet accessible remote desktop and sharing password to the technical support vendor are some of these examples. They could lead to server being compromised or...
Release Date: 5 Dec 2018 20420 Views

Ransomware Decryption Guideline

If computer or smart device were infected with ransomware, please do not pay the ransom. Users can search for the decryption tool in the following webpage: https://www.nomoreransom.org/en/decryption-tools.html   Most ransomware variants do not...
Release Date: 27 Sep 2018 4776 Views

Seven Habits of Cyber Security for SMEs

Background: The WannaCry ransomware swept the world in May 2017. Many local SMEs were frightened. Those which became victims were threatened to pay ransom to get back their data.   With the popularisation of smart technology, more and more business transactions are conducted over the network...
Release Date: 11 Sep 2018 7130 Views

How to configure your Windows PC to use the secure DNS service? (For home users only)

Table of Contents:   Window 11 Window 10 Window 7   [Updated on 17 Feb 2022]  Added procedures for Windows 11   Many security incidents are used to lure user to access the malicious site via a phishing URL or malware background execution. To avoid and...
Release Date: 10 Jul 2018 5574 Views