Mobile

Requirements for Students

Requirements for Students

 

... ...
Standard
When does it apply?

Desktop and Portable Computer Standard

Always

Password Standard

Always

Signature Standard

Always - All authentic RIT communications should include an appropriate signature as per the

Requirements for Faculty/Staff

Requirements for Faculty and Staff

Security Standards

... ...
Standard When does it apply?
Desktop and Portable Computer Standard Always
Password Standard Always
Information Access & Protection Standard Always

Mobile Devices

Mobile Devices

Mobile devices are not always designed with security in mind and, as a result, are not as secure as most computers.

There are a number of ways in which information on a mobile device may be breached: theft of the device, attacks on your service provider, wireless hijacking or "sniffing", and unauthorized access. Because mobile devices may be more easily stolen or compromised, users of these devices must take precautions when using them to store or access Private or Confidential information. 

Private Information... ...

The Growth of Mobile Malware

Since the advent of the internet, cybercrime has been a problem. As we progress to a wider range of digital devices, more opportunities for cyber criminals present themselves. Malicious mobile programs have increased threefold in the past year according to research by Kaspersky Lab. The main purpose of mobile malware is to steal money from its victims. This can be achieved through banking Trojans, ransomware, SMS Trojans, and malicious apps in app stores.

Trojans

Banking Trojans can impersonate the interface of your banking application in order to steal your banking credentials. Meanwhile, SMS Trojans can infect your device and... ...

Using LinkedIn’s New Two-Factor Authentication

Using LinkedIn’s New Two-Factor Authentication

The growing trend in sites adding two-factor authentication to their log in process has many feeling more secure in their social media and other online interactions.

With passwords being easy to compromise with phishing attacks, many users have been hoping for something more secure.  Two-factor authentication gives a double protection on your account, requiring you to know something (your password), and have something in your... ...