Secure Your Device

Password Protect Your Device

Follow the instructions provided by your mobile device provider. Links are provided in the right column.

Mobile Device Security Recommendations

  1. Be aware of your surroundings when using a mobile device. Eavesdroppers on your conversation, criminals who want your device or valuables, vehicles that may run into you and any number of other hazards are things to be avoided.
  2. Keep your mobile device's software and system up to date. Mobile devices, like most computers, require regular updates in order to keep them secure and have the latest features available. Configure your device to use automatic update features where possible.
  3. If you download applications or other software, don't forget to check for updates for these as well; be sure you get your downloads from reputable sources.
  4. Get anti-viral software for your device, and be sure to keep signatures up-to-date.
  5. Enable a password or personal identification number (PIN) if available. Enable the auto-lock feature (e.g., when you close the device it automatically locks until you enter your password or PIN) if your device supports it. Be sure to avoid the 10 most common passwords: 1234, 0000, 2580, 1111, 5555, 5683, 0852, 2222, 1212, and 1998
  6. Make sure that your browser security settings are configured appropriately.
  7. Never leave your mobile device unattended. Keep the device on your person, within your reach, within your sight, or in a secured location at all times.
  8. Enable "remote wipe" features where available. In the event the device is lost or stolen, your personal data and privacy may be at risk; wiping would make the data unreadable.
  9. Remember to backup your data on a regular basis.
  10. Use secure Wi-Fi networks and avoid unknown networks. Do not conduct personal business (e.g. pay bills, online banking, provide credit card information) using an unsecured network.
  11. If you have features on your device that you do not use (e.g., Bluetooth), disable those features. Set any Bluetooth device to "non-discoverable."
  12. As with any computing device you want to be cautious about clicking on links or returning calls or messages from unsolicited or unknown callers. Be cautious when clicking on QR (Quick Response) codes – be sure you know what the code points to.
  13. Avoid using jailbroken, rooted or similar devices. Though usability might be enhanced, so is the likelihood that the device will be compromised; altered devices are specifically targeted by malware.
  14. Protect your device from the elements. Mobile devices are fairly reliable but susceptible to damage from being dropped, getting wet, freezing in a cold vehicle, or cooking on a hot dashboard.
  15. When it's time to replace or dispose of the device, be sure to securely remove all data from the device.