- Lock Your Device - A lost or stolen smart phone or tablet may ruin your day with having to find those contacts again, the money you spent, etc... Now think about this. What information do you have on your phone or tablet that may ruin your research, department, or University if it were to fall in the hands of someone else? Would an email that is in your account cause NDSU to be out of compliance? Do you have a password saved for your bank account? A key combination, swipe pattern, or password would eliminate a lot of worry.
- Apps! - They are the coolest things that smart phones and tablets have come up with; little bits of code that check your mail, report trending topics, calculate your gas milage, or show you where Jupiter is located right now. Know where your apps come from, most phones and tablets have their own place to purchase and install applications for your device. Make sure that you read what the app is going to have access to, what the app is going to report, and costs associated with the app. For the most part these repositories vet the apps before you are allowed to download them, however, its not a bad idea to read several pages of reviews from other customers before installing a strange app on your mobile platform.
- Updates - Every phone or tablet manufacturer performs routine updates, usually several times a year, make sure you do not skip the updates, however, with updates, you may wish to wait a few days after the updates are made public before installing, just so if there are problems with the updates, those are fixed before your device gets them. But make sure that your device remains up to date with it software.
- Smart Tips to Protect Your Device and Your Data
- Configure your mobile device to be secure and safe
- Enable a numerical key, swipe pattern or complex password on your device.
- Set the device to autolock after X number of minutes of inactivity.
- If available, enable remote wipe on your device should it become lost or stolen.In
- Install anti-virus software on the device. Keep the anti-virus software up-to-date.
- Avoid connecting to open or "free" WiFi services such as those in Internet cafe's and coffee shops. Connect to secure WiFi networks where possible. Disable or turn off WiFi when not in use.
- Disable or turn off Bluetooth and infrared features when not in use. When in use, set them to be non-discoverable to render them invisible to unauthenticated devices.
- Keep your device's operating system software and applications that you installed on it current with all patches and updates. Select the automatic update option if available. Most devices will alert you that there are updates that need to be downloaded. Do not ignore the notices. Update all applications and services in a timely manner.
- Avoid storing and transmitting personally identifiable information, work related data, and confidential information from and to your device. If you need to do this, use a secure mechanism such as a VPN for transfer of information and encrypt the information when it is stored on your device.
- Use appropriate methods of sanitization and disposal when you no longer have a use or need your mobile device. Be sure to erase or wipe the data from your device; simply deleting the data will not completely remove it from the device's storage. This is especially important if you trade in the device to upgrade to a better device, give the device to a friend or family member, or sell the device to a third party.
- Use appropriate security measures to protect your mobile device and data from loss or theft.
- Never leave your device unattended. Know its whereabouts at all times.
- If your device should become lost or stolen, report it immediately to the proper authorities.
- If you send and receive NDSU email or store NDSU related data on your mobile device, notify the NDSU Help Desk immediately; they will assist you with remotely wiping the data from the device.
- Back up your data on a regular basis.
- Use care when downloading and installing apps and services to your device. Ensure that you are downloading from a reputable Web site or from the device's "app store."
- Be cautious when opening unsolicited emails, text messages, and when clicking on links or attachments contained in those messages.
- Stay current on emergying threats and vulnerabilities for mobile devices. A good resource for reference is US-CERT.
- Configure your mobile device to be secure and safe
Feb 4, 2016
Security Vendor Malwarebytes called out for highly insecure products.
A Google security researcher called out Malwarebytes for failure to secure their servers, including some privilege escalation flaws, and not using any encryption techniques for downloading updates to its popular anti-malware software. Malwarebytes is stating that it could three to four weeks to fix the flaws found.
Aug 4, 2015
Free Windows 10 Upgrade, yes indeed Windows 10 is a free upgrade for a year for computers with Windows 7 and 8 installed on them. However, Microsoft will not tell you about this in an e-mail. Ransomware (software that will encrypt your files and then ask for money for the decryption key) has been seen being delivered through an e-mail promising a free windows 10 upgrade. Delete these messages as you get them and do not open any attachment that you did not expect to receive.
Jul 28, 2015
1.4 million cars recalled for vulnerable remote control. Fiat, Chrysler, Jeep, and Dodge vehicles can possibly be controlled remotely over the Sprint network. Researchers have shown that while sitting at their desks they can take over many functions of a vehicle on the road through the onboard Infotainment system tied to the Sprint cellular network.