Mobile Device Health and Security

Purpose of mobile security:

  • Safeguarding your identity and personal information is your primary responsibility.
  • You must have a security-aware mindset
  • This article provides general recommendations for mobile security to enhance personal and institutional security

Why do you need mobile security?

  • Mobile devices are the emerging target for malware, hackers and social engineering attacks
  • Widespread proliferation of mobile phones makes for a large target
  • Lack of security awareness heightens vulnerability

Best Practices:

  • Enable a Passcode for Access
    • An unprotected phone allows a malicious actor to “become you”:
    • Emails – personal and institutional
    • Social Media – unauthorized posts
    • Purchases – they buy, but you pay
  • Use dual-factor authentication if available in device
    • Use strong passwords in your personal accounts
  • Use “Auto-Lock” Features
    • Automatically locks the phone after a specified amount of idle time (preferably <10 minutes)
    • In combination with a PIN, it helps to prevent unauthorized access
    • Also helps reduce power drain on the battery
  • Use Secure Network Connections
    • When away from campus, your carrier’s network is best
    • May incur data charges depending on your plan
  • Use VPN software to access USNH/UNH resources
    • Avoid public wireless “hotspots”
  • Use Device Location Features
    • Available in all phones
    • Allows you to locate lost/stolen devices
    • Tape a business card to the back of your device so it can be returned if the battery is discharged
  • Register your devices with the University Police and your insurance company
    • Take photos of your devices with serial numbers for proof of ownership
  • Turn off Wi-Fi & Bluetooth If Not Needed
    • Prevents passive intrusion
    • Saves Power
  • Turn off “Location Services” where appropriate
  • Use Airplane Mode when networks are not needed at all
  • Use Mobile Antivirus Software
    • None offered or supported yet by USNH/UNH
    • Offered by most carriers
    • Any protection is better than none
  • Keep Your Phone Updated
    • Operating System: iOS, Android, Windows Mobile
    • Firmware
    • Security Policies (Mainly Android)
  • Keep Your Applications Updated
    • Provides the latest security & performance updates, and bug fixes
    • Only use reputable sources:
      • Application Stores
        • In-application updating
    • Only Use Legitimate Apps from official and reputable sources:
      • Apple Store
      • Google Play Store
      • Windows Mobile App Store
    • Do not use apps from “hack” or “warez” sites
    • Do not use pirated apps
  • Avoid Legally Protected Data
    • USNH institutions possess data protected by:
      • HIPAA
      • FERPA
      • GLBA
      • PCI-DSS
      • CJIS
      • Other regulatory and business standards
    • Do not travel outside the country with sensitive data on your phone
  • Erase Your Phone Before Disposal
    • Before trading in or selling
    • Use the built-in “factory restore” feature
    • Do it with your own hands to ensure safety
  • Report Security Incidents
    • Unauthorized access or hacking
    • Lost or stolen device
    • Change all passwords both personal and university

For more information including detailed instructions on enabling security on mobile devices using iOS, Android and Windows operating systems, contact ISS via our webform at or contact the IT Service Desk at 603-862-4242 or at

Custom Fields
  • Department: Information Security Services
Attached Files
There are no attachments for this article.
Related Articles RSS Feed
FIRE Program: Manage Notifications
Viewed 518 times since Tue, Aug 1, 2017
System Center 2012 Endpoint Protection for Mac Installation
Viewed 4944 times since Wed, Aug 12, 2015
Find sensitive data before the bad folks do!
Viewed 1170 times since Mon, Jun 27, 2016
Password Managers 101
Viewed 920 times since Mon, Oct 16, 2017
FIRE Program: View Other Members in Your Team (Space)
Viewed 626 times since Tue, Aug 1, 2017
Microsoft Security Essentials and Windows Defender Installation
Viewed 44232 times since Wed, Aug 12, 2015
Websites: Requesting an Account
Viewed 1994 times since Mon, Jan 30, 2017
ESI: Electronically Stored Information Procedures
Viewed 2036 times since Wed, Apr 29, 2015
Vendor Contracts: Privacy Considerations, Security Review, and NDA
Viewed 2593 times since Mon, May 4, 2015
Storing Restricted and Sensitive Data in Box @ UNH
Viewed 1663 times since Thu, May 28, 2015