Mobile Safety Tips
- Never assume that voice calls are confidential.
- Keep your phone safe. It takes just moments for someone to install a malicious program, compromise the security of the SIM card or install a special battery with a bug in it, all of which can later be used to help intercept calls.
- Protect your phone and voice mail PINs and never leave confidential information in voice mail or text messages.
- Be wary of text messages, system messages, or events on your phone that you did not ask for, initiate or expect.
- Turn off Bluetooth except when you’re using it to not only squeeze more juice from your battery but also to prevent hackers from gaining access to your text messages and contacts.
- Only give your mobile phone number out to people you know and trust.
- Make sure you know how to block others from calling your mobile phone.
- You should never give anyone else’s number out without asking them if it’s okay to do so.
- For laptops, notebooks, and tablets follow the steps in securing your computer.
Portable computers, tablets, and smartphones have an added risk of being easier to steal. It is important to have a way to secure your computer when you are not using it. If you have sensitive information stored on a College-owned computer, the College is responsible by law to notify anyone whose information may have been compromised.
- Never leave your mobile device unattended, even for a minute.
- Buy and use a laptop security cable. Lock your notebook computer in a safe location when not in use. When you are using your notebook computer but need to step away for a moment, the cable will discourage anyone from walking away with your computer.
- Get it logged. Get it back! If your laptop or other portable device is lost or stolen, your chances of aiding law enforcement to recover it are greatly enhanced if you can provide them with the make, model, and serial number. Use the serial number tracker template (gsheet) to keep track of your stuff.
Using WiFi is a convenient way to use the network from remote locations. However, WiFi is a shared network. A shared network is like a dinner party—anyone can eavesdrop on your conversation, if they know how. Sophisticated network sniffing tools make it simple for others to look at network traffic and capture data in-transit.
Connect with care
- Be cautious about the sites you visit and the information you release, especially when you’re online through an unsecured or unprotected network.
- Get savvy about WiFi hotspots: Limit the type of business you conduct and adjust the security settings on your device to limit who can access your phone.
- Protect your $$: When banking and shopping, check to be sure the site is security enabled. Look for web addresses with https:// or https://, which means the site takes extra measures to help secure your information. http:// is not secure.
- Disable the geotagging feature on your phone.
- Use a personal firewall when on an untrusted network (e.g., cafe, hotel, or at a conference). Set the firewall to deny ALL incoming connections.