ITS Home  |  Service Catalog  |  Knowledge Base  |  Support Center  |  Contact ITS Service Desk     

Mobile Device Security Best Practices

Smartphones and tablets have become such an integral part of our life, it's hard to imagine how people used to communicate, access and share information, and even pay bills without them. The following security tips will help you secure your device and prevent malicious programs or people from accessing it.


Install Security Updates & Update Apps Regularly

  • Most importantly, ensure security and app updates are installed for the device as they become available.

Enable Auto-Lock and Use a Lock Screen

  • Ensure your device requires a passcode, fingerprint, or similar factor to unlock it and that it automatically enters a lock state when idle.

Do Not Open Unknown Attachments or Click Unknown Links

  • These might infect your device with a virus.

Install Anti-Virus Software

  • Just like computers, phones and tablets are also susceptible to worms and viruses.

Avoid Installing Unrecognized Apps or Apps From Unknown Authors

  • Always evaluate the legitimacy of apps prior to installing them on mobile devices.  This includes making sure the software comes from a reputable vendor and is being downloaded from an official app repository.

Encrypt Your Device

  • If your device is lost or stolen, encryption will help to prevent unauthorized access to your data.

Enable “Remote Wipe”

  • This allows for your data on the device to be remotely erased if it becomes lost or stolen.

Enable “Find My Device”

  • In case your device is lost or stolen, you can use this service to potentially locate and retrieve it.

Do Not Connect to Unrecognized or Unsecured Wireless Networks

  • Unencrypted or “open” wireless networks are particularly prone to eavesdropping.

  • Do not auto-connect to networks and turn off Wi-Fi and Bluetooth when you are not using them.

Do Not Store Sensitive Information

  • Do not store sensitive information on mobile devices, even if the contents are encrypted (e.g., credit card numbers, SSNs, passwords, etc.)

Do Not “Root” or “Jailbreak” Your Device

  • Rooting or jail-breaking your device could disable built in security features of your phone, like the firewall, could install malware on your computer and can make it difficult to regularly pull down security updates.

Do Not Leave Your Phone/Tablet Unattended

  • Treat these devices as you would treat cash.


Other Resources


Related Articles

Request Support  |  805-756-7000  |  Service Catalog

Site Map  |  Privacy Notice  |  Web Accessibility Statement  |  © 2024 California Polytechnic State University