Hover here for Site Tools
Moving Targets
Moving Targets

Moving Targets 

Cyber Clicks 

Mobile computing devices have become indispensable tools. Small but risky, and as powerful as desktops or laptops.

Risky Business

Mobile devices can increase productivity, but the risks can be significant. 

  • Store significant amounts of personal, private or sensitive information
  • Portability makes it more difficult to implement physical controls
  • Device's can be lost or stolen
  • Information may be intercepted in cyberspace
  • Data loss
  • Malware risk, malware can infect mobile devices to be used as a platform for malicious activity.

Mobile Security

  • Keep mobile system and application software patched and up-to-date.
  • Download applications only from vendor-authorized sites. Sites offering free games or ring tones may distribute malware.
  • Follow your organization's policy about downloading software used for work.
  • Don’t risk being exposed to malware by opening unexpected attachments. As with your desktop, only open attachments from trusted sources.
  • Do not click links unless they are from trusted sources. Beware links from unsolicited email or text messages which may introduce malware.
  • Report a lost device to your carrier or organization immediately. Some devices allow the data to be erased remotely.
  • Wipe all data from the device before disposing of it to prevent others from accessing the data.