Summary
Mobile device health and security is explained in this article, including the purpose, why mobile security is needed, and some of the best practices to use.
Body
Summary
Mobile device health and security is explained in this article, including the purpose, why mobile security is needed, and some of the best practices to use.
Content
Purpose of Mobile Security
- Safeguarding your identity and personal information is your primary responsibility.
- You must have a security-aware mindset
- This article provides general recommendations for mobile security to enhance personal and institutional security
Why do you need mobile security?
- Mobile devices are the emerging target for malware, hackers and social engineering attacks
- Widespread proliferation of mobile phones makes for a large target
- Lack of security awareness heightens vulnerability
Best Practices
- Enable a Passcode for Access
- An unprotected phone allows a malicious actor to "become you":
- Emails -- personal and institutional
- Social Media -- unauthorized posts
- Purchases -- they buy, but you pay
- Use dual-factor authentication if available in device
- Use strong passwords in your personal accounts
- Use "Auto-Lock" Features
- Automatically locks the phone after a specified amount of idle time (preferably <10 minutes)
- In combination with a PIN, it helps to prevent unauthorized access
- Also helps reduce power drain on the battery
- Use Secure Network Connections
- When away from campus, your carrier’s network is best
- May incur data charges depending on your plan
- Use VPN software to access USNH resources
- Avoid public wireless "hotspots"
- Use Device Location Features
- Available in all phones
- Allows you to locate lost/stolen devices
- Tape a business card to the back of your device so it can be returned if the battery is discharged
- Register your devices with the University Police and your insurance company
- Take photos of your devices with serial numbers for proof of ownership
- Turn off Wi-Fi & Bluetooth If Not Needed
- Prevents passive intrusion
- Saves Power
- Turn off "Location Services" where appropriate
- Use Airplane Mode when networks are not needed at all
- Use Mobile Antivirus Software
- None offered or supported yet by USNH
- Offered by most carriers
- Any protection is better than none
- Keep Your Phone Updated
- Operating System: iOS, Android, Windows Mobile
- Firmware
- Security Policies (Mainly Android)
- Keep Your Applications Updated
- Provides the latest security & performance updates, and bug fixes
- Only use reputable sources:
- Only Use Legitimate Apps from official and reputable sources:
- Apple Store
- Google Play Store
- Windows Mobile App Store
- Do not use apps from "hack" or "warez" sites
- Do not use pirated apps
- Avoid Legally Protected Data
- USNH institutions possess data protected by:
- HIPAA
- FERPA
- GLBA
- PCI-DSS
- CJIS
- Other regulatory and business standards
- Do not travel outside the country with sensitive data on your phone
- Erase Your Phone Before Disposal
- Before trading in or selling
- Use the built-in "factory restore" feature
- Do it with your own hands to ensure safety
- Report Security Incidents
- Unauthorized access or hacking
- Lost or stolen device
- Change all passwords both personal and university
For more information including detailed instructions on enabling security on mobile devices using iOS, Android and Windows operating systems, contact the IT Service Desk at 603-862-4242 or Request IT Help.
Need additional help?
For more information including detailed instructions on enabling security on mobile devices using iOS, Android and Windows operating systems, contact the Technology Help Desk.
Visit the Technology Help Desk Support page to locate your local campus contact information or to submit an online technology support request. For password issues you must call or visit the Help Desk in person.