Template:Security guidelines: Difference between revisions
→Security guidelines
Line 2: | Line 2: | ||
In this article you can find details about all Teltonika's supported security features also what device has which security implementations and a guide how to use them properly. | In this article you can find details about all Teltonika's supported security features also what device has which security implementations and a guide how to use them properly. | ||
==Security | ==Security Guidelines== | ||
Below you may find some of the most common security recommendations - these recommendations can and should be applied not only to Teltonika devices, but to all internet-facing appliances. It is always advised to adhere to the following security recommendations whenever device is exposed to the internet in some way. | Below you may find some of the most common security recommendations - these recommendations can and should be applied not only to Teltonika devices, but to all internet-facing appliances. It is always advised to adhere to the following security recommendations whenever device is exposed to the internet in some way. |