Mobile Device Health and Security

Purpose of mobile security:

  • Safeguarding your identity and personal information is your primary responsibility.
  • You must have a security-aware mindset
  • This article provides general recommendations for mobile security to enhance personal and institutional security

Why do you need mobile security?

  • Mobile devices are the emerging target for malware, hackers and social engineering attacks
  • Widespread proliferation of mobile phones makes for a large target
  • Lack of security awareness heightens vulnerability

Best Practices:

  • Enable a Passcode for Access
    • An unprotected phone allows a malicious actor to “become you”:
    • Emails – personal and institutional
    • Social Media – unauthorized posts
    • Purchases – they buy, but you pay
  • Use dual-factor authentication if available in device
    • Use strong passwords in your personal accounts
  • Use “Auto-Lock” Features
    • Automatically locks the phone after a specified amount of idle time (preferably <10 minutes)
    • In combination with a PIN, it helps to prevent unauthorized access
    • Also helps reduce power drain on the battery
  • Use Secure Network Connections
    • When away from campus, your carrier’s network is best
    • May incur data charges depending on your plan
  • Use VPN software to access USNH/UNH resources
    • Avoid public wireless “hotspots”
  • Use Device Location Features
    • Available in all phones
    • Allows you to locate lost/stolen devices
    • Tape a business card to the back of your device so it can be returned if the battery is discharged
  • Register your devices with the University Police and your insurance company
    • Take photos of your devices with serial numbers for proof of ownership
  • Turn off Wi-Fi & Bluetooth If Not Needed
    • Prevents passive intrusion
    • Saves Power
  • Turn off “Location Services” where appropriate
  • Use Airplane Mode when networks are not needed at all
  • Use Mobile Antivirus Software
    • None offered or supported yet by USNH/UNH
    • Offered by most carriers
    • Any protection is better than none
  • Keep Your Phone Updated
    • Operating System: iOS, Android, Windows Mobile
    • Firmware
    • Security Policies (Mainly Android)
  • Keep Your Applications Updated
    • Provides the latest security & performance updates, and bug fixes
    • Only use reputable sources:
      • Application Stores
        • In-application updating
    • Only Use Legitimate Apps from official and reputable sources:
      • Apple Store
      • Google Play Store
      • Windows Mobile App Store
    • Do not use apps from “hack” or “warez” sites
    • Do not use pirated apps
  • Avoid Legally Protected Data
    • USNH institutions possess data protected by:
      • HIPAA
      • FERPA
      • GLBA
      • PCI-DSS
      • CJIS
      • Other regulatory and business standards
    • Do not travel outside the country with sensitive data on your phone
  • Erase Your Phone Before Disposal
    • Before trading in or selling
    • Use the built-in “factory restore” feature
    • Do it with your own hands to ensure safety
  • Report Security Incidents
    • Unauthorized access or hacking
    • Lost or stolen device
    • Change all passwords both personal and university

For more information including detailed instructions on enabling security on mobile devices using iOS, Android and Windows operating systems, contact ISS via our webform at https://td.unh.edu/TDClient/Requests/ServiceDet?ID=172 or contact the IT Service Desk at 603-862-4242 or at https://td.unh.edu/TDClient/Requests/ServiceDet?ID=160

Custom Fields
  • Department: Information Security Services
Attached Files
There are no attachments for this article.
Related Articles RSS Feed
Recommended tools for SFTP/FTP
Viewed 195 times since Mon, Sep 10, 2018
ESI: Electronically Stored Information Procedures
Viewed 1947 times since Wed, Apr 29, 2015
PCI DSS - Payment Card Security
Viewed 2076 times since Thu, May 7, 2015
Good Security Practices to Adopt at Work/School, and at Home
Viewed 763 times since Fri, Jul 14, 2017
System Center 2012 Endpoint Protection for Mac Installation
Viewed 4676 times since Wed, Aug 12, 2015
Tips for Keeping Your Devices Secure
Viewed 719 times since Fri, Aug 4, 2017
Websites: Using Secure FTP (SFTP) in Dreamweaver CS4 or earlier
Viewed 1399 times since Mon, Jun 15, 2015
What’s the Deal with Publicly Posted Credentials?
Viewed 806 times since Thu, Jun 29, 2017
Vendor Contracts: Privacy Considerations, Security Review, and NDA
Viewed 2379 times since Mon, May 4, 2015
myPages: Personal Website Service
Viewed 1325 times since Fri, Jun 9, 2017
MENU