Mobile

Requirements for Faculty/Staff

Requirements for Faculty and Staff

Security Standards

... ...
Standard When does it apply?
Desktop and Portable Computer Standard Always
Password Standard Always
Information Access & Protection Standard Always

Requirements for Students

Requirements for Students

 

... ...
Standard
When does it apply?

Desktop and Portable Computer Standard

Always

Password Standard

Always

Signature Standard

Always - All authentic RIT communications should include an appropriate signature as per the

Mobile Devices

Mobile Devices

Mobile devices are not always designed with security in mind and, as a result, are not as secure as most computers.

There are a number of ways in which information on a mobile device may be breached: theft of the device, attacks on your service provider, wireless hijacking or "sniffing", and unauthorized access. Because mobile devices may be more easily stolen or compromised, users of these devices must take precautions when using them to store or access Private or Confidential information. 

Private Information... ...

The Growth of Mobile Malware

Since the advent of the internet, cybercrime has been a problem. As we progress to a wider range of digital devices, more opportunities for cyber criminals present themselves. Malicious mobile programs have increased threefold in the past year according to research by Kaspersky Lab. The main purpose of mobile malware is to steal money from its victims. This can be achieved through banking Trojans, ransomware, SMS Trojans, and malicious apps in app stores.

Trojans

Banking Trojans can impersonate the interface of your banking application in order to steal your banking credentials. Meanwhile, SMS Trojans can infect your device and... ...

Protective Mobile Device Software

One in every five people in the world own a smartphone according to a 2013 report in Business Insider and with the significant growth of smartphone usage, the issues surrounding mobile security have also grown. 

It is more important than ever to arm mobile devices with protective software.  PCs have been the target of malware and virus attacks for years, but recently mobile devices are being targeted more frequently.  Cyber criminals are most often creating malicious programs to gain access to financial information.

The major target for these attacks is Google’s Android operating system due to the rapid expansion and... ...