Overview
Mobile devices , including (smartphones, tablets, PDAs, and other similar devices etc.) are often significant risks due to their portability and broad utilization for work and personal needs. If your mobile device is lost, stolen, or compromised, your personal information and any relevant University data may be placed in jeopardy.
...
Expand |
---|
title | Mobile Device Security Checklist |
---|
|
Guidelines for keeping your mobile devices and the data they contain secure: - Back up your files - don’t keep the only copy on your mobile device.
- Keep your device with you - One of the biggest threats is loss or theft.
- Think twice - Be thoughtful about the information stored on your device, how it is collected through third-party apps, and what gets shared on websites you visit. Manage your app permissions. When you grant apps access to your device, you may be giving them access to your personal information and giving the app permission to perform functions on your device.
- Own your online presence - Use security and privacy settings to manage what is shared in downloaded apps and on social media.
- Secure your devices by using strong passwords, passcodes, passphrases, or other features such as touch identification and lock your devices.
- Be aware of where you are and where your device is.
- Enable Encryption on your devices and use KeePass (or another password vault) if you store passwords on your phone.
- Update your devices regularly - Keeping the most up-to-date security software, web browsers, operating systems, and apps are is the best defense against viruses, malware, and other online threats.
- Delete apps you no longer use.
- Disable WiFi and Bluetooth when not in use. Some stores, restaurants, and other locations look for devices with WiFi or Bluetooth turned on to track your movements while you are within range. In addition, limit your public WiFi usage and public wireless networks are not secure (Anyone could potentially see what you are doing on a laptop, tablet, or smartphone while connected to public networks.)
- Use a VPN (a virtual private network) for a more secure connection
- Don’t Know? Don’t Answer. - Fraudulent text messages, calls, and voicemails are on the rise. If you received something from someone you don’t know or it’s from someone you know but it looks suspicious, don’t reply. Email and mobile requests for personal data or immediate action are almost always scams.
|
...
Contact them at 828-262-6266, enter a support ticket at https://at support.appstate.edu/, or visit them on the bottom floor of Anne Belk Hall. Room 140.
App State Mobile Security Materials
Free Mobile Antivirus Software:
...
Expand |
---|
title | Responsibility For Mobile Device Security |
---|
|
The University does not currently centrally manage the security of personal mobile devices. For this reason, employees need to be aware that they are individually responsible for the security of their personal mobile devices. To help address this responsibility, ITS strongly recommends following the security Protocols protocols listed below. |
Expand |
---|
title | Confidential or Sensitive Data |
---|
|
University data that has been classified as Confidential or Sensitive should not be stored on personal mobile devices. Common examples of data that should not be stored on these devices include:
- Personal Identifiers (Social Security Numbers, Drivers license, State identification card, or Passport numbers)
- Financial Data (Credit Card Numbers, Debit Card Numbers, Checking / Savings Account Numbers)
- Authentication Data: (Biometric Information, Passwords, Digital Signatures)
- Health Information (Protected Health Information)
|
...
Expand |
---|
title | 4. Secure Wireless Networking |
---|
|
Because our mobile devices go with us wherever we go, it is easy to become accustomed to using wireless networks in a manner that can expose our information. - All Devices: Disable WiFi & Bluetooth networking when not in use.
- All Devices: Limit use of authenticated (public) wireless (use cell mobile data plan instead)
|
Related Articles
...