1 / 16

Smartphone and Mobile Device Security

Smartphone and Mobile Device Security. IT Communication Liaison’s Meeting October 11, 2012 Theresa Semmens, CITSO. Smartphones and Mobile Devices. What would we do without them? Phone service and text messaging WiFi and cellular Internet capabilities

carlie
Download Presentation

Smartphone and Mobile Device Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Smartphone and Mobile Device Security IT Communication Liaison’s Meeting October 11, 2012 Theresa Semmens, CITSO

  2. Smartphones and Mobile Devices What would we do without them? • Phone service and text messaging • WiFi and cellular Internet capabilities • Document storage and productivity capabilities • Different from computers: • Less likely to have up-to-date software and anti-virus software installed • Size • Functionality

  3. Common uses • Reading NDSU and personal email • Scheduling appointments & reminders • Accessing social Websites • Listening to music and watching videos • Playing online games • Online shopping, banking and bill paying

  4. Smartphone Risks • Increase mobility → Increased exposure • Easily lost or stolen • device, content, identity • Susceptible to threats and attacks • App-based, Web-based, SMS/Text message-based

  5. Best Security Practices • Password protect Passcode protect Pass swipe protect?

  6. Best Security Practices cont. • Install Security Software • Anti-virus and anti-malware available for mobile devices • Keep your apps up-to-date • Install a phone finder app • Enroll in a backup program • Set device to wipe contents after specified number of failed login attempts

  7. Best Security Practices cont. • When installing apps • Take time to read the small print • What information does the app require access to? • Where are you downloading the app from? • Is it the app store location set by default on the phone?

  8. Best Security Practices cont. • Know where your device is at all times • Be mindful of how you use your device • Follow same guidelines as you do for your computer • Double check URLs for accuracy • Don’t open suspicious links • Make sure the Website is secure before giving any personal data

  9. Best Security Practices cont. • Limit your activities when using public WiFi • Your cellular network connection is more secure than WiFi • Check URL’s before making a purchase https:// is secure; http:// is not

  10. Lost or Stolen? • Treat as if your purse or wallet • File a report with law enforcement • Contact your service vendor to cancel your service and report your device missing • If you have a backup/wipe program, contact your vendor to have them wipe the device • NDSU email? Notify the IT Help Desk

  11. Smartphone Nabbing & Infection • Difficult to determine • Decreased performance • Slow operation and decreased function • Random action • Phone powers on by itself • Applications open on their own • Items are downloaded without permission • Phone log shows calls you didn’t make • Emails are sent to addresses you don’t recognize

  12. Key Points • Password/Passcode protect your device • Lock your device • Use anti-virus software • Sync/back up your data • Install a phone finder app

  13. Want more information? NDSU IT Security Web site www.ndsu.edu/its/security/

  14. Questions?

  15. Smartphone and Mobile Device Security IT Communication Liaison’s Meeting October 11, 2012 Theresa Semmens, CITSO

More Related