What You Need to Know About Mobile Device Security

The SUNY Geneseo College Green

The College Green

October is National Cyber Security Awareness month. This is the second article in a four-part series on security brought to you by the Information Security Program Team.

Mobile devices require strong security protection because their nature generally places them at a higher security risk.

Smartphone Scams

  • During the recent presidential election, people received text or recorded messages offering them the chance to cast their vote by phone, simply by pressing a key for each of the candidates. This was a trick targeted at voters of one political persuasion or another, to stop victims from actually casting their vote for real. You can’t vote this way — yet.

  • Think before granting permission for an app to access information on your mobile device. Many apps request permission to access your contacts, and other personal information they don’t really need. Read the apps terms before agreeing and cancel the installation if you’re asked for too much access.

Protect Against Loss and Theft

  • Password protect your device and enable auto-lock. Choose the strongest password that your device can support: A minimum of 6 digits is recommended. In addition, use a biometric password, like a fingerprint.
  • Encrypt your device.
  • Consider using a wallpaper image or lock screen that provides contact information should someone find your device and wish to return it.
  • Enable location sharing with a trusted friend or family member, so that your mobile device can be found quickly if it is misplaced.
  • Disabling lost or stolen devices is also possible on some devices. Enable a remote wipe feature if one is available. If your device contains sensitive college data and it is lost or stolen, report it here or call University Police, 585-245-5651.

Connect Securely

  • When on campus, always connect to the secure wireless network (SUNY Geneseo).
  • When charging your device, be wary of public USB ports. Never “Trust this computer” when plugging your device into unknown ports. The safest way to charge is to use the charger provided with your mobile device.

Configuration and Settings

  • Keep your phone's operating system and applications or software updated to protect against harmful software, just as you would your regular computer.
  • Reduce your security risk by only installing necessary applications and services on your device.
  • Do not “jailbreak” your mobile device, or remove software restrictions. This opens up many paths for data theft and prevents you from installing updates as soon as they become available.
  • Bluetooth and IR are two examples of services that can open your device to unwelcome access if improperly configured. To avoid these problems, simply disable theses components unless you need them.

Safe Disposal

  • Erase all your personal information and settings from your mobile device before disposing of it.

Additional Best Practices

  • Mobile devices may not be the best place to store valuable or personal information.
  • Avoid using public WiFi hotspots.
  • Set your web browser for private browsing.
  • Use an ad blocker if your platform supports one. This can save you quite a lot of data and download time as well.
  • Only download from reputable app stores.
  • Backup your device often so that you can restore your information if you lose or damage your device.
  • Check the privacy settings on social networking sites. Know who you are sharing information with.

Related Links