Mobile Device Security

Computing has advanced beyond desktop computers — to laptop computers with all the power of a desktop, to handheld tablets, and to smart phones with Internet access anywhere a cell phone signal is available.

Read more about:

For more detailed information about specific services or devices, visit, "How can I protect data on my mobile device," in the UITS Knowledge Base.

Security & Policy Blog Posts

  • Drupal announced the availability of a patch to fix a critical SQL injection vulnerability in Drupal 7.
  • Creating and maintaining a disaster recovery plan for departments and thier critical services
  • How workplace culture affects information security and how that culture can be improved.
  • The FBI has issued a public service bulletin regarding recent cyber-crimes which target university employees and students. Criminal activities involve payroll and IRS filings.

    Recent Security Bulletins

  • Adobe Flash is vulnerable to exploit that could allow an attacker to take control of the affected system.
  • Vulnerability in SSL 3.0
  • Critical Bash Exploit: Shellshock
  • Vulnerability in OpenS