Mobile Device Security Guidelines

Summary

This article provides an overview of how to secure a personal mobile device.

Body

Overview 

Mobile devices such as smart phones, tablets, or Chromebooks are used to access and store personal information, private information and in some cases UO Records. Notes, photos, financial accounts, saved passwords and more are common examples of the types of data commonly stored on mobile devices.  

In order to prevent unauthorized access to these devices it is important that you properly secure and manage your device. The following links contain examples of cybersecurity best practices for securing your device.

Information

Please follow the links below for specific information:

Details

Details

Article ID: 107860
Created
Fri 5/15/20 3:56 PM
Modified
Fri 9/8/23 1:27 PM

Related Articles

Related Articles (8)

Recommendations to secure an Android device.
This article provides a high-level overview of securing home networks with links to specific articles.
This article contains security recommendations for home Wi-Fi networks.
Security recommendations for iOS devices including iPads, iPhones, and iPods.
This article provides guidance on securing personal IoT devices
Security best practices and guidelines for personally owned computers running the macOS operating system.
Security best practices and guidelines for personally owned computers running the Windows operating system.