Mobile Device Security

Computing has advanced beyond desktop computers — to laptop computers with all the power of a desktop, to handheld tablets, and to smart phones with Internet access anywhere a cell phone signal is available.

Read more about:

For more detailed information about specific services or devices, visit, "How can I protect data on my mobile device," in the UITS Knowledge Base.

Security & Policy Blog Posts

  • Creating and maintaining a disaster recovery plan for departments and thier critical services
  • How workplace culture affects information security and how that culture can be improved.
  • The FBI has issued a public service bulletin regarding recent cyber-crimes which target university employees and students. Criminal activities involve payroll and IRS filings.
  • What is the most overlooked data security measure? It is simple, and anyone can follow this advice.

    Recent Security Bulletins

  • Vulnerability in OpenSSL versions 1.0.1 before 1.0.1g
  • New ransomware named CryptoLocker threatens to destroy data unless a payment is made.
  • Critical Java Vulnerability included in Exploit Kit
  • This bulletin details four recen