One of the biggest security challenges for NC State University is cybercrime — especially when malicious hackers target our mobile devices.
What’s a Mobile Device?
Mobile devices include not only smartphones but also tablets, notebooks, and laptops. Additionally, while desktops are not mobile, you need to secure them by following the same procedures.
What the Pack Can Do
NC State needs every one of us to secure all our mobile devices regardless of who owns them. Otherwise, hackers can wreak havoc not only with university data and our reputation but also with our personal data and lives.
To achieve and maintain a no-breach status at NC State, Information Technology (IT) security controls are critical but not enough. Without every one of us securing all our mobile devices, cybercriminals are afforded countless opportunities to routinely hack into enterprise systems by exploiting the users who fail to comply with specific cybersecurity requirements — all of which can result in data breaches and subsequent multimillion-dollar fines and legal costs to the university.
The cybersecurity team at NC State University has researched and assembled the most effective procedures known to protect your data from malicious hackers. To create and maintain a truly secure mobile device — one that protects you and the pack from cybercrime — you can invest a relatively small amount of time to prevent catastrophic loss to you and the pack.
What You Need to Know
If concerned you cannot recover your device:
- Report loss or theft of your mobile device (regardless of ownership) to your department and wireless carrier (if applicable).
- Report lost or theft of NC State property immediately to Campus Police and submit a completed State Property Incident Report.
- Immediately change any passwords saved on the device unless stored in a secure password manager.
Having strong passwords is one of your best defenses against malicious hackers.
- Use password protection on all mobile devices.
- Consider using passphrases instead of passwords, per se.
- Follow the guidelines for establishing passwords as allowed by your device.
- Configure devices to require a password for access after power-on prior to initial use, and again after a short period of inactivity.
- Configure devices to lock out further access after a number of failed password attempts.
- Change your mobile device password at least once a year.
- Use Two-Factor Authentication (2FA) on the device if available.
- When an application requests permission to use features or data on your device, consider whether or not that application should have those permissions before granting them. This will help protect your device from malware.
Click the icon that best represents your device for detailed procedures:
NOTE: Procedural details and screenshots may vary among devices, Operating System (OS) versions, and system updates.