Mobile Device Security

 

Mobile devices, such as smart phones and tablets, contain as much personal and private information as computers.

People tend not to think about the consequences of what could happen to their information — calendar, contacts, documents, passwords — if their mobile device is compromised. Spam can be sent to your contacts, keyloggers can be installed to monitor your every move (including capturing your bank password), and knowing your physical location from your calendar.

You can increase the security of your mobile devices by taking the same precautions as you do on your computer, and by following the security tips below.


Lock It 

  • Enable a password or pin.
  • Use auto lock feature to timeout in 5 minutes or less.
  • Avoid autocomplete features that remember usernames or passwords.

Use a Secure Connection

  • Configure your device to connect automatically to UAWiFi when on campus.  This also helps to save data time on your phone plan.
  • Use the UA VPN when connecting from a remote location 
  • Turn off GPS tracking services

Secure Your Data

  • Keep your device’s operating system up to date.
  • Avoid storing sensitive data on your device. Back up your data on a computer and in the cloud.
  • Encrypt your device, if such a feature is available.
  • Use SSL encryption (https://) for browsing and webmail whenever possible.
  • Download and install security applications, including anti-malware software and remote wip.
    • Apple products has applications such as Lookout or Avira (both free).
    • Andriod has applications such as like avast! and Avira.
  • Before you get rid of your device, securely delete all data.

Manage Applications

  • Download apps only from trusted sources.
  • Keep apps up to date.
  • Be sure to verify what information your apps have permission to access. For example, game apps should not need access to your contacts.
  • Do not root or jailbreak your device or install third-party firmware. This opens up the ability for hackers to access your device without having to bypass Apple's security.

Physical Security 

  • Don’t leave your devices unattended, or, if you must, leave it in a secure location.
  • Label your property so it can be returned to you if lost.
  • Enroll your device with a locating service.
  • Keep records of your device’s identity information. These can be found by downloading an Apple or Android app to determine your UDID (unique device ID).