Mobile Device Security

Computing has advanced beyond desktop computers — to laptop computers with all the power of a desktop, to handheld tablets, and to smart phones with Internet access anywhere a cell phone signal is available.

Read more about:

For more detailed information about specific services or devices, visit, "How can I protect data on my mobile device," in the UITS Knowledge Base.

Security & Policy Blog Posts

  • The GHOST vulnerability allows an attacker to remotely take control of a system.
  • Drupal announced the availability of a patch to fix a critical SQL injection vulnerability in Drupal 7.
  • Creating and maintaining a disaster recove