Jump to main content

Mobile Device Security

  • Configure mobile devices securely.
    • Enable auto-lock.
    • Enable password protection and use a complex password.
    • Avoid using auto-complete features that remember user names or passwords.
    • Update mobile devices frequently. Select the automatic update option if available.
    • Utilize anti-virus programs and configure automatic updates if possible.
  • Be aware of your connections
    • Disable Bluetooth, infrared, and Wi-Fi connections when not in use.
    • Set Bluetooth-enabled devices to non-discoverable.
    • Avoid joining unknown Wi-Fi networks, or free public hotspots.
  • Use an encryption solution to keep portable data secure in transit.
    • Avoid using or storing confidential data on a mobile device whenever possible.
    • If confidential data must be accessed or stored using a mobile device, make sure you have installed an encryption solution, and/or are using password protection.
  • Take appropriate physical security measures to prevent theft or enable recovery of mobile devices.
    • For laptops, use cable locks.
    • Use tracing and tracking software
    • Never leave your mobile device unattended.
    • Report lost or stolen devices immediately.
    • Remember to back up data on your mobile device on a regular basis.
    • Transport your mobile device in the locked trunk of your car, or disguise it if using the trunk is not possible.
    • Take your mobile device as carry-on luggage when traveling.
  • Use appropriate sanitization and disposal procedures for mobile devices.
    • Delete all information stored in a device prior to discarding, exchanging, or donating it.
    • Bring unwanted devices to the IT Front Office in Carter on the lower level.
  • Links, Apps, etc.
    • Be cautious when opening e-mail and text message attachments or clicking on links.
    • Be careful when downloading apps that the app and/or developer has a safe reputation.
  • Be aware that some countries have import laws preventing the import of technology. 
     Check to make sure that you are not violating import or export laws.
  • What is Smishing?
    Smishing is phishing done via SMS text messaging.
  • How do I protect myself from Smishing?

    If you are not sure if the message is legitimate, do an internet search for the supposed sender and contact the company’s main phone number listed on the website (not one listed in a text message) to verify if the message is legitimate.  Most businesses do not send texts soliciting your response.  If you don’t recognize the sender, delete the text without reading it. 

    • Do not click on links within text messages from unknown sources.
    • Text your friends and family, but avoiding texting unnecessarily. For example, when you’re at a sporting event and it asks you to send a text to have your message show up on the big screen for the whole stadium to see, resist.
    • Do not download apps from unverified sources.
    • Never provide sensitive information via text message.
    • Ensure your mobile phone has security software running and up to date (antivirus, antimalware, firewall).
    • Report smishing to your cell phone provider.
For assistance regarding any of the above, please contact the Technical Support Center at 970-351-HELP.