The Ministry of National Security reminds: Your terminal is facing security risks!
Have you ever connected to a wireless network from an unknown source?
Have you ever clicked on an unknown link in an email?
Have you ever charged your phone on a confidential computer?
Have you ever used a simple terminal password?
Have you ever installed software from unknown sources on your network terminals?
Whether it is unintentional or commonplace, if the above situation has happened to you, then your terminal is facing security risks. Once the terminal device is invaded, the attacker will easily steal important information and data such as identity information, sensitive data and even state secrets stored in the network space of the unit and individuals, which may cause irreparable and serious losses to individuals, enterprises and even national security. The following will teach you how to strengthen the protection of terminal devices and prevent network security risks.
——Avoid the curiosity. Do not use smart electronic devices of unknown origin, especially mobile phones given by foreign organizations or foreign personnel with unknown backgrounds and without network access permission from the national telecommunications management department. Do not click on unknown links, scan QR codes of unknown origin, install unfamiliar software, or connect to public WiFi at will to prevent being implanted with spyware.
——Strengthen technical protection. Develop patch strategies, regularly update operating systems, promptly patch known vulnerabilities, and reduce potential backdoor security risks of terminals. Install antivirus software to effectively detect and delete malware in terminals. Set complex terminal passwords and develop a good habit of changing passwords regularly. Strengthen media management and perform virus detection when removable storage media is inserted into the terminal to prevent malware from entering the terminal along with the storage media.
——Do a good job of physical isolation. Do not bring smart phones, watches, bracelets, tablets, laptops, etc. into confidential key areas, confidential meetings and activity venues, and consciously store the equipment in shielding cabinets or designated locations before entering relevant venues. Do not connect personal smart electronic devices to confidential information systems, confidential information equipment or confidential carriers, and do not charge smart electronic devices on confidential computers.
- Do not store confidential information. Do not discuss confidential and sensitive matters through smart electronic devices such as mobile phones and computers. Do not fill in confidential unit names and addresses that are prohibited from being disclosed during the registration and use of relevant software. Do not use non-confidential terminals to store or process state secrets or work secrets. Do not record sensitive information such as the work unit and position of confidential personnel in detail in the address book. Do not use non-confidential terminals to shoot, transmit, publish, or reprint confidential materials, documents, etc.
Without cybersecurity, there is no national security. Faced with new situations and new challenges, cybersecurity has become an important area of competition among major powers. Terminal devices, as the key line of defense for cybersecurity, are closely related to each of us, and are even more related to national security. The general public must keep their eyes open, be vigilant, continuously improve their security awareness and literacy, always guard against the risks of secret leaks hidden behind network terminals, build a strong line of defense for cybersecurity, and jointly safeguard national security.
![](https://a5qu.com/s/user/default.webp)