skip to content
  • Calendar
  • Maps

Mobile Device Security

Do you know what data your Mobile Device is storing?

First, what is a Mobile Device? The Mobile Device Policy (PPM 10-6), defines a Mobile Device as any handheld or portable computing device including, but not limited to, a smartphone, Personal Digital Assistant , or tablet.

Mobile Devices can be used to access email, documents, and other data that may contain sensitive information. Some of this data may reside on your Mobile Device without you being fully aware of it. When you view an email that has an attachment, do you download it to your device?

If you are a University employee, make sure you are familiar with the Mobile Device Policy and adhere to the standards and guidelines.

Tips to keep your device and data secure

  • Use a strong passcode to lock your phone.
  • Install and keep security software current.
  • Review the rights apps require before installing.
  • Only share your mobile phone number with those you trust.
  • Disable the Geotagging feature on your phone. Instructions can be found at http://icanstalku.com/how.php#disable
  • Practice safe browsing. Just like you do with your computer, be careful what websites you visit.
  • Be cautious when answering emails. If an email is requesting personal information or providing a link to a site or a download, review it carefully before responding or clicking.
  • Set up the feature that allows you to remotely wipe your device to allow you to clear your device of any personal or business data in the event it is lost.

It is important for everyone to be aware of increasing security risks of mobile devices, from laptops and tablets to smartphones and wearable technology, and 24/7 access to your personal data.

  • Protect your device at all times and consider adding a two-factor authentication
  • Check your social media settings by reviewing your social media security and privacy settings frequently. Add 2FA.
  • Educate yourself by staying informed about the latest technology trends and security issues such as malware and phishing.
  • Get trained by contacting your institution’s information technology (IT), information security, or privacy office for additional resources or training opportunities.

Current Resources

The SANS security group releases a monthly newsletter and the January 2016 OUCH! is about Securing Your New Tablet: https://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201601_en.pdf