JSOHO Network
  • GETTING STARTED
    • Start Here (Desktop)
    • Start Here (Mobile)
    • Creating an Account
    • Supply & Borrow APY
    • Liquidations
    • Security Best Practices
      • Strong Password Management
      • Two-Factor Authentication (2FA)
      • Secure Your Solana Wallet
      • Regular Software Updates
      • Safe Internet Practices
      • Monitoring Account Activity
      • Secure Backup Practices
      • Access Control and Device Security
    • FAQ
    • Debugging FAQ
  • DAO & TOKEN
    • DAO
    • Token
    • Governance
  • PROTOCOL
    • JSOHO Pools
      • Introduction
      • How JSOHO Pools Work
      • Types of JSOHO Pools
      • Benefits
      • Getting Started
      • Advanced Strategies
    • Parameters
    • Fees
    • Oracles
Powered by GitBook
On this page
  • Securing Your Devices
  • Safe Device Usage
  1. GETTING STARTED
  2. Security Best Practices

Access Control and Device Security

Securing Your Devices

  1. Use Strong Device Passwords: Ensure that your devices (computers, smartphones) are protected with strong passwords or biometric authentication (fingerprints, facial recognition).

  2. Enable Device Encryption: Enable full disk encryption on your devices to protect your data in case of theft or loss.

Safe Device Usage

  1. Avoid Unauthorized Access: Do not allow others to access your devices or accounts. Lock your devices when not in use.

  2. Install Antivirus Software: Use reputable antivirus software to protect against malware and other security threats.

PreviousSecure Backup PracticesNextFAQ

Last updated 9 months ago