Mobile

Cybersecurity Considerations for Traveling Abroad

Cybersecurity Considerations for Traveling Abroad

Do you travel abroad with a laptop or other mobile device? The information below will be helpful.

A couple of notes:

  1. This communication reviews Cybersecurity concerns. RIT Global Risk Management Services provides a more comprehensive overview of travel policies and considerations.
  2. Travel restrictions can change abruptly, both here and abroad. Review the U.S. State Department Alerts and Warnings before and during travel.

 

Traveling with a laptop and other mobile devices

Should you bring your RIT laptop?

  • It depends. Can

  • ... ...

Avoid Questionable Mobile Apps

Avoid Questionable Mobile Apps

It is important to make sure a Mobile App is reliable before downloading it. Detecting malicious apps is not always easy, but there are a few steps you should take before downloading an app.

One in every five people in the world own a smartphone according to a 2013 report in Business Insider and with the significant growth of smartphone usage, the issues surrounding mobile security have also grown. 

Android users have the highest risk of downloading malicious apps.  Researchers at Kaspersky found over 200,000 samples of mobile malware at the Google Play store and additional... ...

Protective Mobile Device Software

One in every five people in the world own a smartphone according to a 2013 report in Business Insider and with the significant growth of smartphone usage, the issues surrounding mobile security have also grown. 

It is more important than ever to arm mobile devices with protective software.  PCs have been the target of malware and virus attacks for years, but recently mobile devices are being targeted more frequently.  Cyber criminals are most often creating malicious programs to gain access to financial information.

The major target for these attacks is Google’s Android operating system due to the rapid expansion and... ...

Better Passwords for Optimal Mobile Security

Smartphones open a back door into your life.  In the event that a hacker tries to remotely steal your information or your mobile device is lost or stolen, the first step of defense is locking it with secure passwords.  No matter the device you are using, there are improved guidelines to follow in order to keep your data safe.

A common mistake is using passwords like 123456 and password. These, and others like them, are easily cracked by hackers.  A key tip is to always remember that the longer the password, the better

An effective method of creating a... ...

Requirements for Students

Requirements for Students

 

... ...
Standard
When does it apply?

Desktop and Portable Computer Standard

Always

Password Standard

Always

Signature Standard

Always - All authentic RIT communications should include an appropriate signature as per the