Updating...
Skip to main content
Filter your search by category. Current category:
All
All
Knowledge Base
Service Catalog
Search the client portal
Search
Sign In
Show Applications Menu
Client Portal
Sign In
Search
TECHNOLOGY AT MSU
IT Help
Projects Hub
Projects
Services
Knowledge Base
More Applications
Skip to Knowledge Base content
Search
Articles
Blank
Knowledge Base
Desktop and Mobile Computing
Desktop and Mobile Device Support
Mobile Device Support - 10 Steps to Secure Your Mobile Device
Mobile Device Support - 10 Steps to Secure Your Mobile Device
Tags
general-information
iOS
Android
public
Ten steps to help secure your device
Configure mobile devices securely.
Enable auto-lock, with an unlock password
Enable password protection and require complex passwords
Avoid using auto-complete features that remember user names or passwords
Ensure that browser security settings are configured appropriately
Enable remote wipe
Ensure that SSL protection is enabled, if available
Do not "root" or "Jail break" your phone. These actions by definition break security inherent in the devices.
Connect to secure Wi-Fi networks and disable Wi-Fi when not in use.
US-CERT recommends disabling features not currently in use such as Bluetooth, infrared, or Wi-Fi. Additionally, set Bluetooth-enabled devices to non-discoverable to render them invisible to unauthenticated devices
Avoid using unsecured applications over free WiFi
Avoid joining unknown Wi-Fi networks
Disable auto-join for known networks
Update mobile devices frequently.
Maintaining up-to-date software, including operating systems and applications.
Select the automatic update option if available
Utilize anti-virus programs and configure automatic updates if possible.
Install anti-virus software as it becomes available and maintain up-to-date signatures and engines.
Symantec QR Code reader will enable your phone to scan QR codes for links to known malicious sites or scripts.
Use an encryption solution to keep portable data secure in transit.
Data protection is essential. If confidential data must be accessed or stored using a mobile device, make sure users have installed an encryption solution (e.g., GuardianEdge Smartphone Protection, McAfee Endpoint Encryption, PGP Mobile, Pointsec Mobile Encryption).
Do an assessment - or at least be aware - of the encryption options available for mobile devices. Some devices may offer more mature security solutions than others.
Consider using thin client models so that data is centrally and securely maintained. This is one option to help avoid the issue of storing confidential data on mobile devices. It also means not having to develop new solutions every time a new mobile technology is released.
Educate users that they should avoid using or storing confidential data on a mobile device whenever possible.
Know who you are talking to.
Utilize digital certificates where possible for identity verification.
Be cautious when opening e-mail and text message attachments or clicking on links.
Take appropriate physical security measures to prevent theft or enable recovery of mobile devices.
For laptops, use cable locks
Use tracing and tracking software (e.g., LoJack, Computrace, Lookout, MobileMe, STOP, Find my Phone).
Never leave your mobile device unattended
Report lost or stolen devices immediately to local authorities
Remember to back up data on your mobile device on a regular basis
Use appropriate sanitization and disposal procedures for mobile devices; Delete all information stored in a device prior to discarding, exchanging, or donating it.
Register the device with Campus DHCP. The' Network Registration System allows you to register your mobile device under your name and MSUNet ID, which is helpful to identify your device is lost or stolen, then reused on campus.
Units should also educate students, faculty, and staff about mobile device security.
US-CERT recommends that users avoid opening files, clicking links, or calling numbers contained in unsolicited e-mails or text messages.
Be aware of current threats affecting mobile devices.
Know what you're downloading. Make sure you download apps from reputable developers.
Sign in to leave feedback
0 reviews
Blank
Blank
Blank
Blank
Print Article
Related Services / Offerings (1)
Mobile Device Support
Deleting...
×
Share
Recipient(s)
- separate email addresses with a comma
Message
Press Alt + 0 within the editor to access accessibility instructions, or press Alt + F10 to access the menu.
Check out this article I found in the Client Portal knowledge base.<br /><br /><a href="https://tdx.msu.edu/TDClient/32/Portal/KB/ArticleDet?ID=1112">https://tdx.msu.edu/TDClient/32/Portal/KB/ArticleDet?ID=1112</a><br /><br />Mobile Device Support - 10 Steps to Secure Your Mobile Device<br /><br />This article provides steps to secure your mobile device.