Skip to main content
NC State Home

Mobile Device Security

One of the biggest cybersecurity challenges for NC State is malicious hackers targeting our mobile devices.

What Is a Mobile Device?

A mobile device is any portable electronic device that can connect to the internet, including smartphones, smartwatches, tablets, notebooks and laptops.

Why Is Mobile Security Important?

Protecting NC State takes every member of the Pack doing their part. Just one compromised mobile device can lead to data breaches and financial loss for you and our whole community.

Anyone who accesses university IT resources, including our network, systems and data, must follow security requirements to protect our resources from cybercriminals. This includes students and employees using personal devices.

How Can You Protect Your Devices?

Urgent — Lost or Stolen Mobile Devices

If your mobile device is lost or stolen, use Find My Device (for Android) or Find My iPhone (for Apple).

If you cannot recover your device:

  • Report loss or theft of your mobile device, regardless of ownership, to your department and wireless carrier (if applicable).
  • Report loss or theft of NC State property immediately to Campus Police and submit a completed State Property Incident Report.
  • Immediately change any passwords saved on the device unless stored in a secure password manager.

Use Strong, Unique Passwords

  • Using strong passwords is one of your best defenses against malicious hackers.
  • Set up passwords on all mobile devices.
  • Consider using passphrases instead of passwords.
  • Follow the guidelines for establishing passwords as allowed by your device.
  • Configure devices to require a password for access after power-on prior to initial use, and again after a short period of inactivity.
  • Configure devices to lock out further access after a number of failed password attempts.
  • Change your mobile device password at least once a year.
  • Use multifactor authentication on the device if available.
  • When an application requests permission to use features or data on your device, consider whether that application needs those permissions before granting them. This will help protect your device from malware.