Securing Your Mobile Device
Privacy expectations and caution for university information are a requirement even on mobile devices. Scammers and hackers are taking advantage of unsecured mobile devices. Mobile devices need security software to protect from attacks such as cross site scripting and man in the middle. To ignore the need for mobile security is like choosing to run a computer without any regard to security precautions.
Mobile devices range from laptops to handheld smartphones. Pocket sized mobile devices today are as powerful as many computers, but the small size makes them more susceptible to loss or theft. They store personal information, pay bills and run apps that do almost anything including accessing your computer data as if you were sitting in front of your computer.
Any activity that involves sharing personal identifiable information (PII) via WiFi, hotspots, e-mail or text messages needs to be protected. Check for mobile security applications on iTunes, the Android Market or other installable software. Visit TopTenReviews for their recommendations on best mobile security software. Review the tips for keeping your smartphone free of malware.
Use a Passcode Lock
- Require a passcode lock on the device.
- Disable Bluetooth when not in use or disable completely if you do not use it.
Automatic Sleep Model
- Enable An automatic sleep mode after a short period of inactivity to prevent data exposure.
- Enable the ability to remotely wipe the device.
- The owner should be able to initiate a wipe even if they no longer possess the device.
- A device will receive the instruction to wipe all data as soon as it is connected to Wi-Fi or the cellular network. Microsoft Exchange stores data centrally, so no e-mail data should be lost.
- Wiping the device should also be performed when the device is being retired, replaced by a new device, or sold/transferred to another party.
- Enable data encryption if available.
Visit www.bsu.edu/helpdesk for mobile device frequently asked questions.