Print
Print:
Summary
Body
Related Services / Offerings
Mobile Device Support - 10 Steps to Secure Your Mobile Device
Summary
This article provides steps to secure your mobile device.
Body
Ten steps to help secure your device
Configure mobile devices securely.
Enable auto-lock, with an unlock password
Enable password protection and require complex passwords
Avoid using auto-complete features that remember user names or passwords
Ensure that browser security settings are configured appropriately
Enable remote wipe
Ensure that SSL protection is enabled, if available
Do not "root" or "Jail break" your phone. These actions by definition break security inherent in the devices.
Connect to secure Wi-Fi networks and disable Wi-Fi when not in use.
US-CERT recommends disabling features not currently in use such as Bluetooth, infrared, or Wi-Fi. Additionally, set Bluetooth-enabled devices to non-discoverable to render them invisible to unauthenticated devices
Avoid using unsecured applications over free WiFi
Avoid joining unknown Wi-Fi networks
Disable auto-join for known networks
Update mobile devices frequently.
Maintaining up-to-date software, including operating systems and applications.
Select the automatic update option if available
Utilize anti-virus programs and configure automatic updates if possible.
Install anti-virus software as it becomes available and maintain up-to-date signatures and engines.
Symantec QR Code reader will enable your phone to scan QR codes for links to known malicious sites or scripts.
Use an encryption solution to keep portable data secure in transit.
Data protection is essential. If confidential data must be accessed or stored using a mobile device, make sure users have installed an encryption solution (e.g., GuardianEdge Smartphone Protection, McAfee Endpoint Encryption, PGP Mobile, Pointsec Mobile Encryption).
Do an assessment - or at least be aware - of the encryption options available for mobile devices. Some devices may offer more mature security solutions than others.
Consider using thin client models so that data is centrally and securely maintained. This is one option to help avoid the issue of storing confidential data on mobile devices. It also means not having to develop new solutions every time a new mobile technology is released.
Educate users that they should avoid using or storing confidential data on a mobile device whenever possible.
Know who you are talking to.
Utilize digital certificates where possible for identity verification.
Be cautious when opening e-mail and text message attachments or clicking on links.
Take appropriate physical security measures to prevent theft or enable recovery of mobile devices.
For laptops, use cable locks
Use tracing and tracking software (e.g., LoJack, Computrace, Lookout, MobileMe, STOP, Find my Phone).
Never leave your mobile device unattended
Report lost or stolen devices immediately to local authorities
Remember to back up data on your mobile device on a regular basis
Use appropriate sanitization and disposal procedures for mobile devices; Delete all information stored in a device prior to discarding, exchanging, or donating it.
Register the device with Campus DHCP. The' Network Registration System allows you to register your mobile device under your name and MSUNet ID, which is helpful to identify your device is lost or stolen, then reused on campus.
Units should also educate students, faculty, and staff about mobile device security.
US-CERT recommends that users avoid opening files, clicking links, or calling numbers contained in unsolicited e-mails or text messages.
Be aware of current threats affecting mobile devices.
Know what you're downloading. Make sure you download apps from reputable developers.
Details
Details
Article ID:
1112
Created
Mon 3/20/23 4:01 PM
Modified
Fri 8/4/23 8:37 AM
Related Services / Offerings
Related Services / Offerings (1)
Mobile Device Support