Security rules
Use of IoT IoT devices that have proven security and reliability |
The user can only identify passwords of smart devices connected to the IoT Internet of Things |
||
Execute software updates provided by smart device manufacturers |
Periodically delete personal information remaining on IoT IoT devices |
||
If IoT devices have unnecessary functions or apps, remove them |
Refrain from using public networks unless necessary |