Mobile

Requirements for Faculty/Staff

Requirements for Faculty and Staff

Security Standards

... ...
Standard When does it apply?
Desktop and Portable Computer Standard Always
Password Standard Always
Information Access & Protection Standard Always
Computer Incident Handling Standard Always
Portable Media Standard

Cybersecurity Considerations for Traveling Abroad

Cybersecurity Considerations for Traveling Abroad

Do you travel abroad with a laptop or other mobile device? The information below will be helpful.

A couple of notes:

  1. This communication reviews Cybersecurity concerns. RIT Global Risk Management Services provides a more comprehensive overview of travel policies and considerations.
  2. Travel restrictions can change abruptly, both here and abroad. Review the U.S. State Department Alerts and Warnings before and during travel.

 

Traveling with a laptop and other mobile devices

Should you bring your RIT laptop?

  • It depends. Can you do without it? Unless you need your laptop to conduct

  • ... ...

Avoid Questionable Mobile Apps

Avoid Questionable Mobile Apps

It is important to make sure a Mobile App is reliable before downloading it. Detecting malicious apps is not always easy, but there are a few steps you should take before downloading an app.

Android users have the highest risk of downloading malicious apps.  Researchers at Kaspersky found over 200,000 samples of mobile malware at the Google Play store and additional sources.  The malicious malware is often used as a multiplier, sending text messages containing malicious links to the contacts saved on the phone or stealing other personal information directly from the infected phone.

The popular app,... ...

Protective Mobile Device Software

One in every five people in the world own a smartphone according to a 2013 report in Business Insider and with the significant growth of smartphone usage, the issues surrounding mobile security have also grown. 

It is more important than ever to arm mobile devices with protective software.  PCs have been the target of malware and virus attacks for years, but recently mobile devices are being targeted more frequently.  Cyber criminals are most often creating malicious programs to gain access to financial information.

The major target for these attacks is Google’s Android operating system due to the rapid expansion and... ...

Choose a Secure Lock Screen

Smartphones contain a wealth of personal information. In the event of your mobile device being lost or stolen, the first line of defense is locking it securely. Smartphones offer several locking options including patterns, pins, passwords, and biometric methods. 

Pattern

  • Uncheck the "make pattern visible" option. This makes it much more difficult for people around you to see your pattern. 
  • Use six or more nodes in your pattern
  • Don't use a simple or common pattern. 40% of patterns start in the top left corner and 77% start in one of the four corners.

PIN

  • Use at least a six digit PIN. 
  • Avoid
  • ... ...