Undergraduate


Apply NowGive Now

Securing Your Mobile Device

Find us on Facebook link Email Icon Help Icon

These are great suggestions from the website of the Austrailian Government Initiative.  These fit globlally!  - Take time to read morehttp://www.staysmartonline.gov.au/home_internet_users/Secure_your_mobile_phone_and_devices

Remember it's not 'just a phone'

  • Treat your smart phone like your wallet – keep it safe and on your person at all times.
  • Remember your smart phone is a computer – all the same security rules apply. This includes checking the authenticity of websites, not clicking on links from people you do not know, and watching out for phishing scams (by email, text or even voicemail) asking for personal information.

Secure your phone

  • Turn on the security features of your phone. All phones have security settings, so familiarise yourself with them and turn them on.
  • Many mobile phones allow users to set a password or Personal Identification Number (PIN) that must be entered to use the phone. Passwords and PINs make it more difficult for thieves to steal your personal information if your phone is lost or stolen.
  • Put a PIN on your SIM card and password on your phone so that thieves cannot steal your phone credit or run up your phone bill.
  • Consider installing security software from a reputable provider. Anti-virus, anti-theft, anti-malware and firewall software is available for some mobile phone operating systems. Check with your phone manufacturer for recommendations.
  • Check for updates to your phones operating system regularly. Install them as soon as they are available – these updates often contain changes that will make your phone more secure.
  • Bluetooth lets you wirelessly connect to devices and transfer information over short distances. For Bluetooth to work, devices need to see each other and then connect. It is best to leave your phone in undiscoverable mode (hidden) so that it is only visible when you specifically need other people or devices to see it. This means that hackers cannot easily see your phone and they cannot easily connect to it unless they already have your Bluetooth address. When connecting using Bluetooth, do so in private, uncrowded areas only.
  • Be smart with Wi-Fi. When connecting to the internet using Wi-Fi, try to use an encrypted network that requires a password and which you are sure is operated by a reputable provider. Read our tips for using public wireless networks.
  • Change your settings so that your phone asks permission to join a new wireless network.

IT Helpdesk
Room 121 Dougherty Science Center
email:  ithelpdesk@cn.edu | phone:  865-471-3506 Carson-Newman Information Technology Logo