Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Library Taxonomy
Information security takes on new dimensions in a mobile context. The protection of sensitive data, IT systems, and user privacy requires different strategies. Given the limited control colleges and universities have over the mobile devices and apps on campus, what solutions can institutions find to address issues of mobile security? Explore this resource site—a collection of all EDUCAUSE resources related to mobile security.
Articles, Papers, and Reports
- 7 Things You Should Know About Mobile Security, March 2011
An EDUCAUSE summary of the ways in which mobile computing amplifies some existing security concerns and introduces new ones, including issues surrounding user privacy.
Mobile Computing 5-Day Sprint—Day 4 Recap -- Security, Privacy, and Policy , June 2011
This brief summarizes day 4 of the EDUCAUSE Mobile Computing 5-Day Sprint, held April 25–29, 2011.
Mobile Internet Device Security Guidelines, June 2011
A wiki designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. This site is maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Ten Steps to Secure Your Mobile Device, August 2010
A wiki featuring advice about securing mobile devices and a list of links to additional resources about mobile security, maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Presentations and Seminars
Hot Topic Discussion: Mobility, Telecommuting, and the Cloud, April 2010
From the 2010 Security Professionals Conference, a presentation (including slides and a recording of the session) by Adam Goldstein and Joe St. Sauver that outlines the threats posed by mobile devices and measures that can limit the risk.
Location-Sharing Technologies: Privacy Risks and Controls, July 2010
An EDUCAUSE Live! web seminar with Lorrie Faith Cramor, who discusses the risks to user privacy posed by mobile devices, as well as strategies and tools that provide a level of control over how location-specific information is shared.
Mobile Computing: Safe or Sorry?, October 2010
A Point/Counterpoint presentation by Mark Bruhn and John Suess at the EDUCAUSE 2010 Annual Conference (including a video of the session and a shortened, audio version), in which the speakers debate strategies for securing mobile devices on campus.
Smartphone Privacy & Security: What Should We Teach Our Users?, April 2011Updated May 2012
In this session, an active researcher from Carnegie Mellon University will explore mobile privacy and security issues and suggest how campus policies can mitigate some of the larger risks.
Library Items on this Topic
EDUCAUSE Library Items for Mobile Security
- 7 Things You Should Know About Mobile Security
March 17, 2011
Very small computing devices represent a new frontier in the computer security war. Mobile devices amplify existing security concerns while introducing a new set of risks, but most people have …
- Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…
- Containing the Security Threat of Mobile Apps in Higher Ed
May 6, 2013
Key Takeaways Security breaches and data loss become likelier as more students, faculty, and staff bring their own devices to campus. With a growing number of new offeri…
- Cybercrime Threats: How Criminals Bypass Security Measures to Steal Your Sensitive Data and Money and Ruin Your Reputation
May 16, 2012
A session at the Security Professionals Conference 2012
Data breaches and credential/PII theft incidents are becoming more prevalent, and recent red flag rules require heightened data security procedures. Meanwhile, BYOD, social media proliferation, and…
- Data Privacy Legislation: An Analysis of the Current Legislative Landscape and the Implications for Higher Education (8/12/11)
August 12, 2011
With the ubiquity of mobile devices and the increases in data breaches, Congress has responded with bipartisan support for comprehensive privacy legislation. As of August 2011, 18 bills have bee…
- Expert Discussion Session: Mobile Applications and Device Support: Are Your Applications Mobile Ready?
October 14, 2010
Students are arriving on campus with new wireless devices and recent fourth-generation wireless products, and devices continue to expand features and functionality. Which applications should becom…
- For BYOD Best Practices, Secure Data, Not Devices
July 17, 2012
Author, Thor Olavsrud, writes for CIO Magazine that "IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to …
- Is Your Mobile Phone Putting You At Risk?
April 28, 2011
Very small computing devices represent a new frontier in the computer security war. Mobile devices amplify existing security concerns while introducing a new set of risks, but most people have an…
- January is Data Privacy Month: Free Webinars and Easy Ways to Increase Awareness
December 7, 2011
You know the importance of protecting personal identities and the effects social media can have on privacy, but does everyone on your campus? During the month of January, EDUCAUSE is expanding o…
- Podcast: Jodi Ito on the Information Security Program at the University of Hawaii
January 20, 2012
Jodi Ito is the Information Security Officer at the University of Hawaii. She is responsible for the development and implementation of the university's new information security…