Securing Mobile Devices

Overview

Many of us are reliant on phones or tablets to assist us with a variety of tasks throughout the day. While people take the time to secure their laptop or other devices, they sometimes fail to realize that much of the same sensitive information resides on their mobile devices.

Tips for Securing Your Device

  • Always lock your device with a passcode or pattern. The default "swipe to unlock" feature is not a secure option. Instructions for enabling device security for iOS and Android are available.
  • Set your device to automatically lock after a very brief period of inactivity. This gives you the best chance of your device will remain secure in case of theft or loss.
  • Use caution when connecting to public wireless networks; instead, connect to secure wireless networks when available (e.g. NCU-Secure).
  • Be aware of physical surroundings when using your device in public. It's possible for bystanders to "shoulder surf" and observe sensitive info on your screen.
  • Keep your device's software and operating system updated. Updates ensure that hackers have a tougher time exploiting security holes and bugs.
  • Encrypt your device if this is possible. Mobile devices are easier to steal and to lose. Protect your data.
  • Disable Bluetooth when not in use.
  • Disable options and applications that you don't use: Reduce security risk by limiting your device to only necessary applications and services.
  • Verify applications before downloading: Some apps could be harmful to your mobile device, either by carrying malware or by directing you to a malicious website that may collect your sensitive information (e.g. credit card information).
  • Don’t click on unsolicited links in text messages or emails. Verify the sender first, via phone or in person.
  • Enable tracking software to help find a lost or stolen device Such software can not only locate your device, but also secure or erase it if stolen.
Print Article

Related Articles (1)

A compromised account is one accessed by a person not authorized to use the account.

Related Services / Offerings (1)

If you suspect a potential security issue involving any private information—whether the information is on a computer, on paper, on the web, etc.—immediately report the details to IT.