Mobile Device Security

Computing has advanced beyond desktop computers — to laptop computers with all the power of a desktop, to handheld tablets, and to smart phones with Internet access anywhere a cell phone signal is available.

Read more about:

For more detailed information about specific services or devices, visit, "How can I protect data on my mobile device," in the UITS Knowledge Base.

Security & Policy Blog Posts

  • The FBI has issued a public service bulletin regarding recent cyber-crimes which target university employees and students. Criminal activities involve payroll and IRS filings.
  • What is the most overlooked data security measure? It is simple, and anyone can follow this advice.
  • Current State of TrueCrypt Encryption software.