- Lock Your Device - A lost or stolen smart phone or tablet may ruin your day with having to find those contacts again, the money you spent, etc... Now think about this. What information do you have on your phone or tablet that may ruin your research, department, or University if it were to fall in the hands of someone else? Would an email that is in your account cause NDSU to be out of compliance? Do you have a password saved for your bank account? A key combination, swipe pattern, or password would eliminate a lot of worry.
- Apps! - They are the coolest things that smart phones and tablets have come up with; little bits of code that check your mail, report trending topics, calculate your gas milage, or show you where Jupiter is located right now. Know where your apps come from, most phones and tablets have their own place to purchase and install applications for your device. Make sure that you read what the app is going to have access to, what the app is going to report, and costs associated with the app. For the most part these repositories vet the apps before you are allowed to download them, however, its not a bad idea to read several pages of reviews from other customers before installing a strange app on your mobile platform.
- Updates - Every phone or tablet manufacturer performs routine updates, usually several times a year, make sure you do not skip the updates, however, with updates, you may wish to wait a few days after the updates are made public before installing, just so if there are problems with the updates, those are fixed before your device gets them. But make sure that your device remains up to date with it software.
- Smart Tips to Protect Your Device and Your Data
- Configure your mobile device to be secure and safe
- Enable a numerical key, swipe pattern or complex password on your device.
- Set the device to autolock after X number of minutes of inactivity.
- If available, enable remote wipe on your device should it become lost or stolen.In
- Install anti-virus software on the device. Keep the anti-virus software up-to-date.
- Avoid connecting to open or "free" WiFi services such as those in Internet cafe's and coffee shops. Connect to secure WiFi networks where possible. Disable or turn off WiFi when not in use.
- Disable or turn off Bluetooth and infrared features when not in use. When in use, set them to be non-discoverable to render them invisible to unauthenticated devices.
- Keep your device's operating system software and applications that you installed on it current with all patches and updates. Select the automatic update option if available. Most devices will alert you that there are updates that need to be downloaded. Do not ignore the notices. Update all applications and services in a timely manner.
- Avoid storing and transmitting personally identifiable information, work related data, and confidential information from and to your device. If you need to do this, use a secure mechanism such as a VPN for transfer of information and encrypt the information when it is stored on your device.
- Use appropriate methods of sanitization and disposal when you no longer have a use or need your mobile device. Be sure to erase or wipe the data from your device; simply deleting the data will not completely remove it from the device's storage. This is especially important if you trade in the device to upgrade to a better device, give the device to a friend or family member, or sell the device to a third party.
- Use appropriate security measures to protect your mobile device and data from loss or theft.
- Never leave your device unattended. Know its whereabouts at all times.
- If your device should become lost or stolen, report it immediately to the proper authorities.
- If you send and receive NDSU email or store NDSU related data on your mobile device, notify the NDSU Help Desk immediately; they will assist you with remotely wiping the data from the device.
- Back up your data on a regular basis.
- Use care when downloading and installing apps and services to your device. Ensure that you are downloading from a reputable Web site or from the device's "app store."
- Be cautious when opening unsolicited emails, text messages, and when clicking on links or attachments contained in those messages.
- Stay current on emergying threats and vulnerabilities for mobile devices. A good resource for reference is US-CERT.
- Configure your mobile device to be secure and safe
Jul 28, 2015
1.4 million cars recalled for vulnerable remote control. Fiat, Chrysler, Jeep, and Dodge vehicles can possibly be controlled remotely over the Sprint network. Researchers have shown that while sitting at their desks they can take over many functions of a vehicle on the road through the onboard Infotainment system tied to the Sprint cellular network.
Feb 17, 2015
Over-sharing on a first date could lead to no second date, but over-sharing on a social media site could lead to data theft, real property theft, or physical danger to yourself or your family. There are lots of automated scripts already running on the Internet looking for keywords that are posted to social media, these scripts do everything from changing the word "meet" to "meat" and posting the results to twitter, to alerting potential thieves that a family is now on vacation and away from their house. Be safe on social media
Feb 6, 2015
New Slim Spray Diet ... Want a Cruise ... Fight Hair Loss Now ... SPAM SPAM SPAM ... It seems to get into every e-mail inbox beofre the account is even setup. But there are some ways to fight this menace.
- Don't reply to it
- Don't tell vendors your e-mail account
- If your service has the option, report it or mark it as spam
There are more ways to fight in the link below.
FEB 4, 2015
Its Tax Refund Season, Time for a new phone or tablet. But what about the old one? Do you have information on that device that could be used against you? How can you make sure that your old phones and devices don't come back to haunt you when you are done with it? Many people buy old equipment off ebay just to see what kind of data is left on those devices. Follow this guide to make sure that your device is wiped clean before you dispose of it.
FEB 3, 2015
When you download an app on social media or your mobile device, you may be allowing it to collect personal information like your contacts list or location. If possible, look at an app’s permissions before downloading and make sure you are comfortable with the information it collects. If the app does not tell you what information it collects, error on the side of caution and assume that it may be collecting information.
FEB 2, 2015
There is a security and privacy threat almost everywhere you go. Most don't even think about it. Free WIFI, if its free how can that be bad? In fact most Free WIFI could be quite safe, but a few access points could have an active sniffer on the line watching every single nibble of data that goes across its interface, looking for passwords, usernames, or e-mail addresses. Click Below for more information on safely using WIFI when traveling.