Protect Mobile Devices (Smartphone, iPad, or Other Tablet)
Steps to secure your handheld devices
This article applies to: Secure Your Computer and Mobile Device
Best practices for everyone (students, faculty, and staff): Although these are requirements for employees handling sensitive information, it is also good practice to configure all devices in this way for extra protection against loss or theft.
Definition of mobile handheld devices: Any handheld device that operates to hold, store, process, and access data, including smartphones, cellphones, tablets, or personal digital assistants (PDAs) used to conduct university business.
Best Practices for All Mobile Handheld Devices
- Avoid keeping confidential data or otherwise sensitive information mobile devices, because they are more likely to be lost or stolen and harder to encrypt.
- Keep software updated, since mobile devices are vulnerable to direct attacks from both malware (viruses, etc.) and phishing. Warning: Antivirus and personal firewalls are currently unavailable for mobile phones.
- Delete any text you receive with passwords or other sensitive information.
- Only install apps from trusted resources. Apps can host malware that will expose your passwords, credit card numbers, or anything else you type into your mobile device.
- Turn off Wi-Fi and Bluetooth if you aren't using them. Wireless features give remote access to hackers.
- If you do use Wi-Fi, only do so on secure networks that require a password, such as eduroam.
- Back up your data to minimize the chances of losing everything should your device be lost or stolen, or need to be wiped completely due to a virus or other security breach.
- Avoid sharing mobile devices. Personal mobile devices are not designed to support multiple users and can't be set up to protect you from risk caused by other people's activities.
- Cornell’s Office 365 service for faculty and staff makes it possible for some mobile devices to be wiped or disabled remotely.
Requirements for All Mobile Handheld Devices
Required:
Any handheld device that is used in conjunction with Cornell activities, including retrieval of email or calendar data must be configured so that it can be locked or erased if it is lost or stolen.
Recommended:
- Configure the device to lock the console after a period of inactivity no greater than 30 minutes, with a password required to unlock the device. Use of the simple numeric code that is an option on some devices is discouraged.
- Configure the device to erase all data after not more than ten failed attempts to enter the password.
Requirements for Mobile Handheld Devices that Hold, Store, Process, or Access Confidential Data
Required:
- Any handheld device that is used in conjunction with Cornell activities, including retrieval of email or calendar data must be configured so that it can be locked or erased if it is lost or stolen.
- Configure the device to erase all data after not more than ten failed attempts to enter the password.
- The password required to unlock the device must meet or exceed the password complexity requirements outlined for NetID passwords in University Policy 5.8, Authentication to Information Technology Resources.
- The window of inactivity after which the device must automatically lock becomes 15 minutes.
- The device, or the data in question, must be encrypted. If encryption is not supported, the device cannot store confidential data.
How-to Details for Device Types
Apple iOS
Description | How To | Required |
Set a passcode This also enables encryption on the iPhone 3G and newer hardware running iOS 4 or newer. |
| Yes |
Set automatic lock |
| Yes. For confidential data, use 15 minutes or less. |
Configure remote lock/wipe |
| Yes |
Disable simple passcodes |
| Yes, for confidential data |
Disable lock grace period The grace period allows the device to be unlocked after auto-locking without providing an unlock code. |
| Yes, for confidential data |
Erase data on excessive passcode failures Will erase the device after 10 failed attempts |
| Yes, for confidential data |
Encrypt device backups through iTunes | In iTunes, with the device connected, check "Encrypt [devicetype] backup" under Options and select a strong password. | Yes, for confidential data |
Configure location services for lost/stolen devices | Register for Apple iCloud at the iCloud website. This must be done before the device is lost or stolen. | No, but recommended |
Google Android
The exact process for activating security features will vary from device to device and between versions of the operating system. The instructions here are provided for reference only and will not be applicable to all devices. It is recommended that you follow the instructions contained in the operating manual for the device where possible.
Description | How To | Required |
Set a passcode (screen lock) |
| Yes. For confidential data, a password is required. Do not use a PIN. |
Set automatic lock |
| Yes. For confidential data, use 15 minutes or less. |
Enable device encryption |
| Yes, for confidential data |
Configure remote lock/wipe |
| Yes, for confidential data |
Configure location services for lost/stolen devices | There is no native functionality for this; therefore a 3rd party app must be installed. Free applications with this functionality include Sophos Mobile Security and AVG AntiVirus. | No, but recommended |
Windows Phone 8
Description | How To | Required |
Set a passcode |
| Yes. |
Set automatic lock |
| Yes. For confidential data, use 15 minutes or less. |
Configure remote lock/wipe |
| Yes, for confidential data |
Configure location services for lost/stolen devices | Use the MyPhone menu in Windows Live. Windows Live is configured at time of activation. | No, but recommended |
Blackberry 10
Description | How To | Required |
Set a passcode |
| Yes. |
Set automatic lock |
| Yes, for confidential data |
Configure remote lock/wipe | Requires a Blackberry ID.
| Yes, for confidential data |
Enable device encryption |
| Yes, for confidential data |
Configure location services for lost/stolen devices | Use Blackberry Protect. Requires a Blackberry ID. | No, but recommended |
Comments?
To share feedback about this page or request support, log in with your NetID