Texas Tech University

Mobile Devices

Mobile technology is rapidly developing, providing convenience and connectivity inherent in computing on-the-go. The TTU IT Division reminds you that just as your desktop computer can become infected and overrun by malicious intruders, so can your mobile devices. Awareness of what you are doing and where you're visiting, as well as using safe computing practices, can help protect mobile device activity.

Many mobile devices offer services beyond making phone calls, texting, and receiving email. With such a wide variety of mobile devices and options for connectivity, we strongly recommend that you exercise caution and be diligent about practicing safe computing.

Antivirus software exists for some mobile devices; however, it can only assist in protecting against known threats. We are all responsible for understanding the threats and proactively taking steps to avoid them. A high degree of vigilance is necessary to successfully prevent and mitigate future threats to mobile devices.

The United States Computer Emergency Readiness Team (US-CERT) recommends the following best practices to help protect mobile devices:

  • Enable the personal identification number (PIN) or password to access the mobile device, if available
  • Maintain up-to-date software, including operating systems and applications
  • Install antivirus software as it becomes available and maintain up-to-date signature and engines
  • Encrypt personal and sensitive data, when possible
  • Disable features not currently in use such as Bluetooth, infrared, or Wi-Fi
  • Set Bluetooth-enabled devices to “non-discoverable,” so that unauthenticated devices cannot detect them
  • Use caution when opening email and text message attachments
  • Use caution when clicking links contained in text messages and email
  • Avoid opening files, clicking links, or calling numbers contained in unsolicited email or text messages
  • Avoid joining unknown Wi-Fi networks
  • Don't install apps you don't need and delete unused apps
  • Delete all information stored in a device prior to discarding it
  • Maintain situational awareness regarding mobile device threats; and
  • Do not leave your mobile device unattended