Protect Your Portable Devices
It is important to make sure you secure your portable devices to protect both
the device and the information contained on the device.
The following outlines steps you can take to protect your mobile communication device. Some of the steps are dependent upon the functionality of your device.
- Use a password to access your device. If the device is used for work purposes, you should follow the password policy issued by your organization.
- If the Bluetooth functionality is not used, check to be sure this setting is disabled. Some devices have Bluetooth-enabled by default. If the Bluetooth functionality is used, be sure to change the default password for connecting to a Bluetooth enabled device.
- Do not open attachments from untrusted sources. Similar to the risk when using
your desktop, you risk being exposed to malware when opening unexpected attachments. - Do not follow links to untrusted sources, especially from unsolicited email or text messages. Again, as with your desktop, you risk being infected with malware.
- If your device is lost, report it immediately to your carrier or organization. Some devices allow the data to be erased remotely.
- Review the security setting on your device to ensure appropriate protection. Be sure to encrypt data transmissions whenever possible.
For more information, please visit:
- National Webcast Initiative on Securing Mobile Devices
- Cyber Security Newsletter Tips – Security of Mobile Communication Devices
- US-CERT National Cyber Security Alert System
- National Cyber Alert System – Cyber Security Tip ST06-007, Defending Cell Phones and PDAs Against Attack
- NIST Special Publication 800-124, Guidelines on Cell Phone and PDA Security
- FTC Consumer Alert – The 411 on Disposing of Your Old Cell Phone
- NASCIO – Security at the Edge – Protecting Mobile Computing Devices
Discover more from Chad M. Barr
Subscribe to get the latest posts sent to your email.