Search Google Appliance

Risks to Mobile Phones and Tablets

Theft or loss

Mobile devices are getting fancier and more popular all the time. This makes them a target for theft. A thief could use your wireless access, steal your identity and credit card information, or cause you to pay for a new phone and unauthorized charges on your bill.

Viruses

Mobile devices are becoming more susceptible to hacks. Attackers exploiting vulnerabilities in the software, by writing viruses and other malware for phones and tablets, can disable your device or expose the data stored on it.

Loopholes in cell phone company security

Some phone companies store your data on their server. Do you trust your phone company to keep your data secure? Phones may not be the best place to store valuable or personal information.

Privacy

Phone conversations can easily be overheard. Passwords, credit card numbers, and other identifiable information is best discussed in a private place.

Bluetooth problems

If Bluetooth settings are not correctly configured an attacker can retrieve address book, call history, and other information from a target phone, or send a virus over a Bluetooth connection. To avoid these problems, be sure to disable the Bluetooth component until you need it.

Before and After a Device Goes Missing

Protection against loss or theft

Protect your phone by: 1) taking precautions in the hopes that your phone can find its way back to you, or 2) making it too difficult for thieves to make use of the phone. Learn more.

If a phone is lost or stolen:

  1. File a police report immediately.
  2. Report the loss as soon as possible to your cellular service provider.
  3. Have the phone number or account disabled so no further charges can be applied in case the service provider is unable to lock the handset (many US service providers won't disable your phone). Thieves will more likely use your service than sell your phone, especially between the moments they steal it and before you realize it's missing.
  4. If a phone was stolen that contained sensitive Institute data -- even if it was encrypted or the phone was locked -- contact infoprotect@mit.edu.
  5. If the phone was insured, contact the insurance agent. Note that theft of mobile devices is not covered by the MIT Insurance program.

Stored Data

Protecting stored data

Consider carefully what information to store on your phone. If it fell into unknown hands, would it cause a disaster? Can you prevent someone from accessing that important information and can you get it back? Precautionary steps you can take:

  1. Encrypt the data stored on the device.
  2. Enable "remote wipe" your device: iOS | Android
  3. Select a strong password to restrict access to the keypad. Change the password often.
  4. Keep your phone's operating system and software patched and updated to protect against harmful software, just like you do with your computer.

Safe disposal

You may want to reduce the amount of data on your device or clear the device of data entirely prior to reselling or recycling it. Did you know that some methods of erasing data do not truly delete the files, even though they may appear to be gone? Learn more about removing sensitive data from mobile devices.

Mobile Devices at MIT

Learn more about mobile phone support and using mobile devices at MIT. Mobile device questions? Contact the Service Desk.