You are now in the main content area

Secure Your Mobile Devices

With your help, TMU can minimize online threats.

Unprotected storage on your mobile device allows attackers or malicious persons to access your data or install malware that can leak sensitive information from your device. Here are some general tips for maintaining the security of your mobile device.

  • enable a power-on passcode
  • configure the device to lock automatically after some inactivity
  • install mobile security software, such as anti-virus software and a firewall if available
  • thoroughly scrutinize all permission requests, for example those involving privileged access, when installing applications
  • turn off wireless connections such as Wi-Fi, Bluetooth and/or infrared connectivity when not in use
  • turn off location services settings if it’s not necessary to run an application
  • apply the latest patches, fixes and software version for your mobile operating system and related backup/synchronization software
  • do not "jailbreak" or hack the device to override usage and/or access limitations
  • use encryption to lock sensitive data stored on the device and removable media, if available
  • set up a remote data wiping feature, if available
  • do not leave your device unattended, under any circumstances
  • be aware of onlookers around you or security cameras - sensitive information you might be typing or viewing could be gleaned or memorized by unauthorized persons
  • be cautious when connecting to public Wi-Fi hotspots - avoid accessing sensitive data unless using an encryption feature or secure end-to-end connection such as a virtual private network (VPN)
  • do not open or follow misleading links in texts or emails from suspicious or untrusted sources
  • do not download or accept programs or content from unknown or untrusted sources
  • turn on the encryption option in the backup/synchronization software, if available
  • make sure your backup copies are encrypted
  • completely clear all data and settings on your device before disposal
  • keep your devices in a secure place, especially when not in use
  • stay informed on mobile device security vulnerabilities and apply the latest patches and fixes when available
  • do not install illegal or unauthorized software
  • do not allow wireless connections from unknown or untrusted sources