It is important to make sure you secure your portable devices to protect both the device and the information contained on the device.
The following outlines steps you can take to protect your mobile communication device. Some of the steps are dependent upon the functionality of your device.
Use a password to access your device.
If the Bluetooth functionality is not used, check to be sure this setting is disabled. Some devices have Bluetooth-enabled by default. If the Bluetooth functionality is used, be sure to change the default password for connecting to a Bluetooth enabled device.
Do not open attachments from untrusted sources. Similar to the risk when using your desktop, you risk being exposed to malware when opening unexpected attachments.
Do not follow links to untrusted sources, especially from unsolicited email or text messages. Again, as with your desktop, you risk being infected with malware.
If your device is lost, report it immediately to MCC’s Technology Support Desk (292-TECH) we can erase data from the device remotely (i.e. email, etc.).
Review the security setting on your device to ensure appropriate protection. Be sure to encrypt data transmissions whenever possible.
For more information, please visit:
"https://www.us-cert.gov/cas/tips/ST04-017.html" US-CERT National Cyber Security Alert System
"https://www.us-cert.gov/cas/tips/ST06-007.html" National Cyber Alert System - Cyber Security Tip ST06-007, Defending Cell Phones and PDAs Against Attack
"https://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt044.shtm" FTC Consumer Alert - The 411 on Disposing of Your Old Cell Phone
"https://www.nascio.org/publications/documents/NASCIO-SecurityAtTheEdge.pdf" NASCIO - Security at the Edge - Protecting Mobile Computing Devices
Communications and Network Services