Mobile Device Protection

Why do we use mobile devices?

  • Large capacity
  • Convenient
  • Portable
  • Compact
  • Fast
  • Easy to use

Risks using mobile devices

  • Easy to steal
  • Easy to misplace
  • Easy to gain access to information through wireless or plain grab and run
  • Devices are used to collect all kinds of information

What kinds of information are at the risk of being compromised?

  • Confidental information
  • Financial information like:
    • Personal - Banking information
    • Corporate - Customer credit card information
  • Student grades
  • Health data
  • Social Insurance Numbers
  • Meeting minutes
  • Unpublished research drafts
  • Staff member reviews
  • Personal contact information like:
    • Phone numbers
    • Email lists
  • Decryption keys and passwords

 

What can be done?

Ask yourself “Is it really necessary that I transport this sensitive information?” . If the answer is no, then do not copy the information.  If it is mandatory that you have to transport information considered to be sensitive, some basic steps are needed to ensure that mobile information is maintained with the highest integrity.

If you're unsure how to proceed forward following these practices, please consult WTS for further assistance.

Best Practices

Think security

Whenever using mobile data, always keep in mind the question: What could happen if an unauthorized person gained control of this information? Look for and try to use the most secure methods for handling data:

Get training-understanding your equipment

Read the instructions. New electronic devices have more features, which mean that you will have more of a learning curve to be able to undersand and use these items properly. Default settings are often the least secure for devices, and everyone who had the same device will have the same default settings. Read the manuals that come with your items and be sure you understand the settings and how to change the default settings, especially anything related to security.

Recommended portable devices

A list of products currently in use around campus:

Use safe/secure passwords

  • Choose a strong password.
  • Enable the password-locking feature of the screensaver on laptops.
  • Passwords should never be written down, especially not next to the computer.
  • Do not use the same password for everything that requires a password. Do not use your work password for your personal banking password etc.

Use encryption

  • Use encryption - Passwords alone should not be your only defense. Always try to use as many security methods as possible, including encryption of data.
  • If you must transport sensitive information, use encryption software to encrypt the information effectively and securely.
  • Be sure to know the proper password and method to un-encrypt the information. Decryption keys locked in safes, safety deposit boxes, or otherwise stored in a safe location can help prevent a data loss catastrophe. Encrypted information cannot typically be recovered.
  • Encryption will not make any difference if there are hard copies of the information in the same case as the stolen laptop.
  • ALL sensitive data should be encrypted, including sensitive information on hard drives, USB devices, CD’s, cell phones, etc.

Also consider the following

  • Never leave your device unattended, even when you think you are only going to be gone for one minute. That is all the time needed for your device to go missing.
  • Do not ask someone you don't know to watch your devices for you. If you have to leave your devices in the care of others, only leave them with people you trust.
  • Wherever possible, use the most secure method available to communicate on the network. When working from off-campus, use Western ROAMs. When using wireless on campus, use the UWOSecure-v2 network.
  • Make frequent and necessary backups of data, in the event that data is lost.  Have a Personal Disaster Recover Plan.
  • If you have a laptop, but are not using the wireless card turn it off.
  • Lock the keyboard when you step away from a computer or mobile device.
  • Make use of the Campus Community Police Service program to mark electronic devices.
  • Do not make your laptop or handheld device an obvious target for theft. Put your laptop case in a knapsack or gym bag.
  • Put them in the trunk of your car before you arrive at your destination - out of sight, out of mind.
  • Do not leave your equipment in a cold car overnight, and if you do, when you bring it into a warm environment, give it some time to warm up. Likewise, do not leave equipment in a hot car during the summer.
  • Be cautious with food and drink around your portable devices. Spills and crumbs can quickly destroy electronics.
  • Scan periodically for viruses/ spyware/ trojans etc.
  • Backup data.
  • Protect your computer.

Lost or Stolen Devices

  • If you have a device that has gone missing, report it as soon as you can to the Western Special Constable Service.  Minimizing the time between the loss and reporting is critical for the chances of locating the missing device.
  • Contact the WTS Helpdesk after making the initial report so that the staff there can advise and assist you in protecting your Western account.


 


Published on  and maintained in Cascade.