Mobile Devices Security Best Practices - Secure Purdue (2024)

Purdue University information security best practices are those steps that you can take on your own to help secure the computing resources that you use. Best practices are not usually related to any particular University information security policy, but are instead a combination of information security tips, tools, and techniques that you can use to protect your resources and data.

Mobile computing devices are devices such as tablets, smart phones, e-readers, and laptop computers. The very features that make these devices useful (portability, access connectivity, data storage, processing power) also make them a security risk to users and to Purdue University when they contain University data. Major features of mobile devices that cause a risk to the user and potentially to the University include their small size (they can be easily lost, stolen, or misplaced); weak user authentication mechanisms that can be easily compromised or simply disabled by the user; and their ease of interconnectedness.

As mobile devices become more powerful and ubiquitous, they need to be treated with the same or greater care than personal computers. This document explains general end-user security measures that can be taken on mobile devices. Taking action to personally ensure computer security helps protect everyone from data and identity theft, viruses, hackers, and other threats. Every member of the Purdue community who uses a computing device makes Purdue’s computing environment more secure by following these best practices.

General Security

  • Keep your mobile devices with you at all times or store them in a secured location when not in use. Do not leave your mobile devices unattended in public locations (e.g., airport lounges, meeting rooms, restaurants, etc.).
  • Mobile devices should be password protected, and auto lockout should be enabled. The password should block all access to the device until a valid password is enabled. The password used should be as strong a password as your device will support. Learn more about “creating strong passwords.”
  • Enable a “remote wipe” feature if available. This also includes features that delete data stored on the mobile device if a password is not entered correctly after a certain number of specified tries.
  • Do not circumvent security features or otherwise “jailbreak” your mobile device.
  • Standard security protocols should be followed. This includes ensuring your device has current anti-virus software and all operating system and application updates and patches. Firewalls should be enabled if possible. Learn more about “End User Security Guidelines.”
  • Wipe or securely delete data from your mobile device before you dispose of it.
  • Lost, stolen, or misplaced mobile devices should be immediately reported to the police. If your mobile device contained Purdue data, also inform your IT department about a lost, stolen, or misplaced device. Learn more about “Security Incidents.”
  • Enable encryption on your laptop and mobile devices, such as Bitlocker for Windows 7 and later, Apple's Filevault for OS X Lion or later, or the encryption mechanism provided by your mobile device manufacturer.

Transmission Security

  • Where possible, data transmissions from mobile devices should be encrypted.
  • Wireless access, such as Bluetooth, Wi-Fi, etc., to the mobile device should be disabled when not in use to prevent unauthorized wireless access to the device.
  • In general, keep your wireless connection on hidden mode unless you specifically need to be visible to others.
  • If available wireless access should be configured to query the user for confirmation before connecting to wireless networks.
  • For example, when Bluetooth is on, select the “check with me before connecting” option to prevent automatic connections with other devices.
  • Be careful when using insecure networks and use the Purdue VPN service to connect to campus resources. Most modern mobile devices are supported with proper configuration.

Application and Data Security

  • Do not install software from unknown sources as they may include software harmful to your device. Research the software that you intend to install to make sure that it is legitimate.
  • When installing software, review the application permissions. Modern applications may share more information about you than you are comfortable with, including allowing for real time tracking of your location.
  • Be careful when storing your personal data on your mobile device. If you lose the device, you could lose your data.
  • Follow the University’s “Data Handling Requirements” with respect to Purdue data stored on your mobile device.

Additional Resources

  1. University Data Classification Guidelines,http://www.purdue.edu/securepurdue/data-handling/index/
  2. University Data Handling Requirements,https://www.purdue.edu/securepurdue/data-handling/index.php
  3. End User Security Guidelines,http://www.purdue.edu/securepurdue/it-policies-standards/it-guidelines/end-user-security-guidelines.php
  4. Security Incident information,http://www.purdue.edu/securepurdue/Services/security-incident.php
  5. Purdue’s VPN Service,https://www.itap.purdue.edu/connections/vpn/
  6. SecurePurdue website,www.purdue.edu/SecurePurdue

Issued July 5, 2006, from the Purdue University Security Officer's Group and IT Networks and Security. Revised December 28, 2011. Questions about this document can be addressed to[email protected].

Mobile Devices Security Best Practices - Secure Purdue (2024)
Top Articles
US Affordable Rental Housing Policy Either Doesn’t Make Any Sense or Is Working as Intended
How to Type a Bitcoin Symbol in Excel & Google Sheets
Where To Go After Howling Pit Code Vein
Tattoo Shops Lansing Il
Chicago Neighborhoods: Lincoln Square & Ravenswood - Chicago Moms
Mrh Forum
Jeremy Corbell Twitter
San Diego Terminal 2 Parking Promo Code
Craigslist Vermillion South Dakota
Chuckwagon racing 101: why it's OK to ask what a wheeler is | CBC News
Embassy Suites Wisconsin Dells
Costco in Hawthorne (14501 Hindry Ave)
2021 Lexus IS for sale - Richardson, TX - craigslist
People Portal Loma Linda
Fear And Hunger 2 Irrational Obelisk
Vegito Clothes Xenoverse 2
Discord Nuker Bot Invite
Nk 1399
Dr Seuss Star Bellied Sneetches Pdf
Ou Football Brainiacs
They Cloned Tyrone Showtimes Near Showbiz Cinemas - Kingwood
Yayo - RimWorld Wiki
Ihs Hockey Systems
Halsted Bus Tracker
6465319333
Bus Dublin : guide complet, tarifs et infos pratiques en 2024 !
Makemkv Key April 2023
SOC 100 ONL Syllabus
Priscilla 2023 Showtimes Near Consolidated Theatres Ward With Titan Luxe
Devotion Showtimes Near The Grand 16 - Pier Park
Craigslist Jobs Brownsville Tx
Cdcs Rochester
Final Jeopardy July 25 2023
Thelemagick Library - The New Comment to Liber AL vel Legis
Nba Props Covers
Gfs Ordering Online
Lbl A-Z
Trivago Anaheim California
Divinity: Original Sin II - How to Use the Conjurer Class
Mathews Vertix Mod Chart
Enr 2100
Florida Lottery Powerball Double Play
Go Nutrients Intestinal Edge Reviews
Kjccc Sports
House For Sale On Trulia
Food and Water Safety During Power Outages and Floods
Solving Quadratics All Methods Worksheet Answers
Billings City Landfill Hours
Tamilyogi Cc
Swissport Timecard
Latest Posts
Article information

Author: Jamar Nader

Last Updated:

Views: 6255

Rating: 4.4 / 5 (55 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Jamar Nader

Birthday: 1995-02-28

Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

Phone: +9958384818317

Job: IT Representative

Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.