Updating...
Skip to main content
Filter your search by category. Current category:
All
All
Knowledge Base
Service Catalog
Search the client portal
Search
Sign In
Show Applications Menu
ITS Portal
Sign In
Search
IT Services
Project Management Office
Facilities Office
Services
Knowledge Base
More Applications
Skip to Knowledge Base content
Search
Articles
Blank
Knowledge Base
Information Security
Smart Phone Security
Smart Phone Security
Tags
Phone
Smartphone
Cyber-Threat
Be-Cyber-Smart
Smartphone-Security
With the increasing use of mobile devices comes accompanying risks to data stored on the devices. Following are a number of best practices to help users secure their smart phones.
Best practices for general smart phone security
Be aware of the possibility of theft. Smart phones are small and easily misplaced or lost. If an individual steals your smart phone, it may be only a matter of time before even the best secured device is compromised.
Be aware of the risks of Social Engineering. If you are making a phone call that involves sensitive information, for example, a credit card number, be sure that no one can overhear you and use your information fraudulently or to commit identity theft.
Contact your smart phone provider as soon as your smart phone is lost or you think it’s been hacked. If the smart phone was provided by TRU, and there is a risk that University-owned sensitive information may be in danger, contact infosecurity@tru.ca or the IT Servicedesk.
Password protect your phone. Use a strong password (minimum of 4 characters)
Turn off Bluetooth, unless you need it. Disabling the Bluetooth service will significantly decrease a hacker’s opportunity to wirelessly hack into your phone and will improve your battery life.
Obtain and install anti-virus software, if it’s available for your model, and keep it updated. New malware is created every day, so it’s important to have anti-virus software on your cell phone.
Don’t accept files and text messages from individuals you do not know.
Obtain and install encryption software for your cell phone, if available. Encrypting data can help users prevent identity theft and the loss of sensitive information. Encryption can also help institutions meet compliance guidelines for provincial and federal regulations, as well as mitigate financial risk.
Press the power button to lock the device whenever it is not in use.
Verify the location of printers before printing sensitive documents.
Consider the privacy implications before enabling location-based services and limit usage to trusted applications.
Manage access to iTunes AppleID, Google and OneDrive accounts, which are tied to sensitive data.
Watch what your accounts access
Keep University-owned sensitive information off mobile devices.
Set your phones auto-lock-out. Recommended time is 1 minute.
Sign in to leave feedback
0 reviews
Blank
Blank
Blank
Blank
Print Article
Deleting...
×
Share
Recipient(s)
- separate email addresses with a comma
Message
Press Alt + 0 within the editor to access accessibility instructions, or press Alt + F10 to access the menu.
Check out this article I found in the ITS Portal knowledge base.<br /><br /><a href="https://tru.teamdynamix.com/TDClient/84/Portal/KB/ArticleDet?ID=1257">https://tru.teamdynamix.com/TDClient/84/Portal/KB/ArticleDet?ID=1257</a><br /><br />Smart Phone Security<br /><br />With the increasing use of mobile devices comes accompanying risks to data stored on the devices. Following are a number of best practices to help users secure their smart phones.