4. Protecting personal devices Best practices for securing smartphones, laptops, and tablets. Time to complete: 5 minutes Related resources Cyber security awareness resourceseast Cyber hygiene – tips and checklists (PDF, 1.65 MB)east ID Support – Password strength testereast < Previous video Next video >