One of the biggest security challenges for NC State University is cybercrime — especially when malicious hackers target our mobile devices. NC State needs every one of us to secure all our mobile devices regardless of who owns them. Otherwise, hackers can wreak havoc not only with university data and our reputation but also with our personal data and lives.
To achieve and maintain a no-breach status at NC State, Information Technology (IT) security controls are critical but not enough. Without every one of us securing all our mobile devices, cybercriminals are afforded countless opportunities to routinely hack into enterprise systems by exploiting the users who fail to comply with specific cybersecurity requirements — all of which can result in data breaches and subsequent multimillion-dollar fines and legal costs to the university.
What You Need to Know
- Protect Your Selfie; Protect the Pack!
- Urgent — Lost or Stolen Mobile Devices
- Detailed Procedures
- Helpful Links
The cybersecurity team at NC State University has researched and assembled the most effective procedures known to protect your data from malicious hackers. To create and maintain a truly secure mobile device — one that protects you and the pack from cybercrime — you can invest a relatively small amount of time to prevent catastrophic loss to you and the pack.
If concerned you cannot recover your device:
- Report loss or theft of your mobile device (regardless of ownership) to your department and wireless carrier (if applicable).
- Report lost or theft of NC State property immediately to Campus Police and submit a completed State Property Incident Report.
- Immediately change any passwords saved on the device unless stored in a secure password manager.
Having strong passwords is one of your best defenses against malicious hackers.
- Use password protection on all mobile devices.
- Consider using passphrases instead of passwords, per se.
- Follow the guidelines for establishing passwords as allowed by your device.
- Configure devices to require a password for access after power-on prior to initial use, and again after a short period of inactivity.
- Configure devices to lock out further access after a number of failed password attempts.
- Change your mobile device password at least once a year.
- Use Two-Factor Authentication (2FA) on the device if available.
- When an application requests permission to use features or data on your device, consider whether or not that application should have those permissions before granting them. This will help protect your device from malware.
Procedural details and screenshots may vary among devices, Operating System (OS) versions, and system updates.
Click the icon matching your device OS:*
*Only Android procedures are available at this time.
Coming Soon: Detailed procedures for iOS, Windows 10, and macOS.
General Mobile Device Guidelines
Security Applications in Android Marketplace
- Google Apps Device Policy for Android
- SplashID Safe Password Manager
- Google Authenticator
- AVG Antivirus Free
Advanced Resources for Technical Users
This resource is for the technical audience interested in the inner workings of the Android OS. As of the time this page was published, the latest update covers 2018 and was published in March 2019.