Think you know mobile security? Take the mission - Mission: Laptop Security
Secure mobile data against loss, theft and unauthorized access
Laptops, Blackberries, PDA's, removable storage drives, and smart phones enable us to get information on the go. We no longer have to be tethered to our desks to check or e-mail, surf the web, or access files and information. Advances in wireless communication have made communication mobile but may have also made it easier for the unscrupulous to access our personal information as well. Unless we secure our mobile data against loss, theft and unauthorized access, we are vulnerable.
The Latest News
Gartner: Security Risks Rise as Smart Phones Get Smarter
Strategy: Securing Mobile Data
How Can You Protect Your Mobile Data?
- Encrypt wireless transmissions using the Auburn VPN (Virtual Private Network) when possible.
- Secure your USB Drive – don’t leave them behind in public labs. Use a third-party encryption method such as the open source truecrypt (http://www.truecrypt.org/) to encrypt your removable storage. Wikipedia is a good starting point for learning more about securing your USB drive.
- Secure your laptop –Don't make it easy for the bad guys: use a carrying case that does NOT look like a laptop bag and don’t leave your laptop unattended. In the AU Library you can check out a lock for your laptop so you don't have to take it with you to the stacks. Taking things one step further, password protect your laptop and consider installing tracking software. More good tips on how to protect your laptop can be found at http://lifehacker.com/search/laptop%20theft
- Secure your handheld device - your cell phone, iPhone, iPod Touch, Blackberry, or any other Smartphone data can be protected by simply setting a password on the device.
What do to if you lose your phone:
If you are on the GroupWise Mobile Server (GMS) or Blackberry Enterprise Server (BES) follow these steps:
Step #1 Immediately contact OIT by calling the HelpDesk at (334) 844-4944 or sending e-mail directly to firstname.lastname@example.org. We can wipe out the data on your phone remotely. It can be restored later but whomever finds your missing phone won’t be able to read all of your e-mail and other sensitive data in the meantime.
Step #2 – Once OIT has verified the hard reset of your phone's data call your service provider and disable the phone number so unauthorized calls cannot be made.
Don’t reverse these steps. Once the phone is disabled OIT won’t be able to access it to perform step #1.
If you are not on the AU Enterprise mobile servers (this would apply to all students) and you lose your phone contact your wireless provider to disable the phone. If you were using your phone to check any e-mail account via IMAP change your password for that account. This will not remove the existing e-mail from the phone but it will prevent future nefarious usage of the account(s).
Wireless Safety in Public Hot Spots
People in Auburn have embraced the use of wireless networks. Unfortunately, online predators know this too. Using unsecured wireless networks can leave you computer, phone and handheld device vulnerable to attack. Here are some tips when using a wireless network:
- Only use legitimate hotspots (wireless access points) - make sure you know who owns the connection you are trying to access.
- Use a VPN client - Download a free VPN client at AU Install. When you connect to a wireless zone log in to the VPN to make your connection secure. For instructions see, How to use the VPN Client at AU.
- Enable your Personal Firewall - Microsoft Windows XP/Vista users have a personal firewall installed. Click your Operating System for instructions on how to enable it: Windows XP | Windows Vista. Other operating system users can download third party software, such as ZoneAlarm.
- Turn off your iPhones built-in WiFi when you aren't using it or you may be auto-connecting to nearby wireless access points - more info here
- Don't forget to secure your wireless network at home by enabling a password for the wireless router or combo modem/router.