Wireless Security: Protect yourself when you’re mobile
Wireless Security: It’s not Just for Laptops Wireless communication is convenient, and for the most part, available almost anywhere. Common types of wireless communication are Bluetooth, WiFi, and WiMax. Wireless security is not just for laptops: consider these wireless devices Cell phones Blackberry Devices PocketPC
Cellular Devices Cellular phones are not considered secure devices Traditionally do not contain options or features to increase security. Usually contain valuable information Phone numbers, contact information, calendar functions, photos, voice recording options, etc. Protect your cellular device from loss or damage Use whatever security features are possible, including locking your phone with a password or security code.
PDAs (Blackberries, PalmPilots, etc) Use password protection, if available. Be sure to use a strong password. Where possible, data transmissions from a PDA should be encrypted. Ethernet, Bluetooth, and other wireless access to the PDA should be disabled when not in use. Wireless access should be configured to request the user for confirmation before connecting to anything. Be cautious when opening any attachments, as they could include software harmful to your PDA.
Laptop Safety and Wireless Guidelines Password protect your laptop Follow a security checklist. An example can be found on the SecurePurdue website: mobileDevice.cfm Do not leave your laptop unattended, and be sure to store it in a secure location when not in use Wireless access should require user authentication before connecting to the computer Disable wireless access when not in use Only use secure wireless connections: a secure wireless connection has a padlock icon next to it
Before you connect… Only connect to secure wireless networks Secure networks will be noted with the gold lock icon Connect only to networks you know and trust Limit what sites you visit when using wireless networks Don’t access sensitive information on unsecured sites while traveling There may be “imposter” PAL (Purdue Air Link) 2.0 networks that are not secure, and are not Purdue networks. The non- Purdue 2.0 networks will exist outside/on the border of the area PAL 2.0 reaches
Resources Mobile Device Security Guidelines actices/mobileDevice.cfm actices/mobileDevice.cfm Security Checklist ecurityChecklist.pdf ecurityChecklist.pdf Security While Traveling actices/traveling.cfm actices/traveling.cfm