Jump to content

Template:Security guidelines: Difference between revisions

 
Line 2: Line 2:
In this article you can find details about all Teltonika's supported security features also what device has which security implementations and a guide how to use them properly.
In this article you can find details about all Teltonika's supported security features also what device has which security implementations and a guide how to use them properly.


==Security guidelines==
==Security Guidelines==


Below you may find some of the most common security recommendations - these recommendations can and should be applied not only to Teltonika devices, but to all internet-facing appliances. It is always advised to adhere to the following security recommendations whenever device is exposed to the internet in some way.
Below you may find some of the most common security recommendations - these recommendations can and should be applied not only to Teltonika devices, but to all internet-facing appliances. It is always advised to adhere to the following security recommendations whenever device is exposed to the internet in some way.