Mobile Device Security

Computing has advanced beyond desktop computers — to laptop computers with all the power of a desktop, to handheld tablets, and to smart phones with Internet access anywhere a cell phone signal is available.

Read more about:

For more detailed information about specific services or devices, visit, "How can I protect data on my mobile device," in the UITS Knowledge Base.

Security & Policy Blog Posts

  • Creating and maintaining a disaster recovery plan for departments and thier critical services
  • How workplace culture affects information security and how that culture can be improved.