Skip to main content

Security Guideline

Filter by:

Mobile Instant Messaging Security Guidelines

  What is IM? IM (Instant Messaging) is a real-time communication system that allows two or more users to transfer text messages, files, voice and video via a network immediately. With the rise of smartphones, IM application turned from PC to...
31 Mar 2015 4822 Views

Near Field Communication Security Guidelines

Near Field Communication (NFC), the name often appears in smartphone. Many electronic devices such as speakers and Bluetooth headsets also support NFC communication. In fact, NFC technology has been used since 1997 in Hong Kong in a popular payment service – the Octopus.   Most...
31 Oct 2013 3841 Views

Bring Your Own Device (BYOD) Security Guidelines

  What is BYOD?   In the past, corporations purchase electronic devices, such as laptops and mobile phones, for staff worked outside of the office. Security of these electronic devices are centralized and managed by IT departments.   In recent years, as the mobile devices...
26 Sep 2013 3966 Views

Guideline of Web Application Security Preventive Measures

Web application developer should take the below preventive measures to protect their web application.   10 Security Preventive Measures Follow HKCERT website for latest updates Ensure user use strong password and provide two-factor authentication Use web application firewall Restrict access and protect web admin...
9 Jul 2013 4326 Views

IPv6 Security Guideline for Business User

  As IPv4 address allocation have already exhausted, IPv6 is the only solution to the shortage of IPv4 address. IPv6 adoption will grow for business user and it is expected both version of Internet Protocol will coexist on the Internet for some years. Therefore, business organizations...
30 May 2013 3016 Views

IPv6 Security Guideline for Home User

Current Internet Protocol version 6 (IPv6) situation in Hong Kong   Everyone should be familiar with the term “IP address”. It is much like a delivery address on the Internet. IPv6 is the new generation Internet Protocol. As IPv4 address allocation have already exhausted...
29 May 2013 3453 Views

Guideline of Mobile Security

Now, more than ever, mobile device applications are getting more and more popular in our daily life. Mobile device applications is becoming a primarily communication channel for us to interact with business partners, family members and friends. Mobility brings us convenience, however, it...
28 Feb 2013 3498 Views

Guideline for Safety Using Wireless LAN

Introduction Wireless LAN (WLAN) is now widely deployed in Hong Kong. You can find paid Wi-Fi hotspots in telephone kiosk, plaza, Internet cafes and hostel, or free Public Wi-Fi hotspots in public library, cultural and recreational centres, ...
2 Apr 2012 10033 Views

Malware Defense Guideline

  Introduction   Today, one of the biggest threats that users and organization facing on the Internet is Malware. Malware is a general terminology and some common types of malware are viruses, worms, Trojan horse, botnets, spyware and adware. Malware...
29 Feb 2012 5929 Views

Document Malware Defense Guideline

  What is Document Malware?   Everyone should familiar with the term “Malware”; however, many people may not know how malware works. “Malware” is a general terminology and can be classified based on its operating mechanism. Most common malwares are Trojan, Worm...
28 Feb 2012 5081 Views