Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by Publications
Filter by Library Taxonomy
Information security takes on new dimensions in a mobile context. The protection of sensitive data, IT systems, and user privacy requires different strategies. Given the limited control colleges and universities have over the mobile devices and apps on campus, what solutions can institutions find to address issues of mobile security? Explore this resource site—a collection of all EDUCAUSE resources related to mobile security.
Articles, Papers, and Reports
- 8 Mobile Device Security Steps, EDUCAUSELive!, October 2013. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the most effective strategies for securing mobile infrastructure.
- 7 Things You Should Know About Mobile Security, March 2011
An EDUCAUSE summary of the ways in which mobile computing amplifies some existing security concerns and introduces new ones, including issues surrounding user privacy.
Mobile Computing 5-Day Sprint—Day 4 Recap -- Security, Privacy, and Policy, June 2011
This brief summarizes day 4 of the EDUCAUSE Mobile Computing 5-Day Sprint, held April 25–29, 2011.
Mobile Internet Device Security Guidelines, June 2011
A wiki designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. This site is maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Ten Steps to Secure Your Mobile Device, August 2010
A wiki featuring advice about securing mobile devices and a list of links to additional resources about mobile security, maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Presentations and Seminars
- Managing and Securing Mobile Devices in Higher Education, May 2013.
Hot Topic Discussion: Mobility, Telecommuting, and the Cloud, April 2010
From the 2010 Security Professionals Conference, a presentation (including slides and a recording of the session) by Adam Goldstein and Joe St. Sauver that outlines the threats posed by mobile devices and measures that can limit the risk.
Location-Sharing Technologies: Privacy Risks and Controls, July 2010
An EDUCAUSE Live! web seminar with Lorrie Faith Cramor, who discusses the risks to user privacy posed by mobile devices, as well as strategies and tools that provide a level of control over how location-specific information is shared.
Mobile Computing: Safe or Sorry?, October 2010
A Point/Counterpoint presentation by Mark Bruhn and John Suess at the EDUCAUSE 2010 Annual Conference (including a video of the session and a shortened, audio version), in which the speakers debate strategies for securing mobile devices on campus.
Smartphone Privacy & Security: What Should We Teach Our Users?, April 2011
In this session, an active researcher from Carnegie Mellon University will explore mobile privacy and security issues and suggest how campus policies can mitigate some of the larger risks.
Library Items on this Topic
EDUCAUSE Library Items for Mobile Security
- Collaborating with Faculty
August 18, 2011
A common information security issue across college and university campuses is how to engage faculty in good security practices to protect university data. In many cases, this is an issue because …
- Higher Education Information Security Council 2014 Strategic Priorities
January 30, 2014
The Higher Education Information Security Council (HEISC) has identified three areas of focus in 2014, which closely align with the 2014 EDUCAUSE Strategic Directions . This year's stra…
- Enterprise Information Security Program
March 26, 2009
The University of Iowa’s program for information security is a combination of policy, security architecture modeling, and descriptions of current IT security services and control practices. …
- Security Task Force 2008â€“2009 Strategic Plan: Safeguarding Our IT Assets, Protecting Our Communityâ€™s Privacy
September 3, 2008
The EDUCAUSE/Internet2 Computer and Network Security Task Force (STF) provides a focal point for the academic community to join together to strengthen the ability of the higher education sector t…
- Information Security Strategic Plan Template
March 17, 2008
This plan was adapted from the University of Colorado System’s “IT Security Program Strategic Plan for 2007-2008.” The purpose of this sample plan is to establish a formal IT Securi…
- Georgia State University System Security Plan
January 1, 2006
This plan is a sanitized version of the Georgia State University System Security Plan. Specific information on technical controls deployed at GSU is omitted. Information about information security …
- University of Washington Network Security Credo
January 1, 2002
Incidents of unauthorized access to networked computer systems in an enterprise are growing at fearful rates. The purpose of this document is to identify general design principles and practices for…