Mobile Device Security

Mobile devices, which include smartphones, smart watches, tablets, notebooks, and laptops, are any portable electronic equipment that can connect to the internet. One of the biggest security challenges for NC State University is cybercrime — especially when malicious hackers target our mobile devices.  NC State requires all mobile devices be secured.

Securing Your Devices

NC State’s Office of Information Technology requires minimum security controls, and although critical, they are not always enough. Without securing our mobile devices, cybercriminals are afforded countless opportunities to routinely hack into enterprise systems by exploiting the users who fail to comply with specific cybersecurity requirements — which can result in data breaches that leak sensitive information belonging to you and others, and subsequent substantial fines and legal costs to the university.

The cybersecurity team at NC State University has researched and assembled the most effective procedures known to protect your data from malicious hackers. To create and maintain a truly secure mobile device — one that protects you and the pack from cybercrime — you can invest a relatively small amount of time to prevent catastrophic loss to you and the pack.

Not sure how to fully secure your phone, here are links to more information and detailed procedures and password best practices:

Lost or Stolen Mobile Devices

If your mobile device is lost or stolen, use Find My Device (for Android) or Find My iPhone (for Apple).

Security Reviews and Non-Capital Asset Tracking

The form below, along with the Equipment Tracking Home / Portable Use Authorization should be completed annually and upon receipt of a new mobile device.

Questions? Need help?

Feel free to contact EPSI with any questions or concerns.