Security rules
![]() |
Use of IoT IoT devices that have proven security and reliability |
![]() |
The user can only identify passwords of smart devices connected to the IoT Internet of Things |
---|---|---|---|
![]() |
Execute software updates provided by smart device manufacturers |
![]() |
Periodically delete personal information remaining on IoT IoT devices |
![]() |
If IoT devices have unnecessary functions or apps, remove them |
![]() |
Refrain from using public networks unless necessary |