Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Mobile Security [x]
- Security Management [x]
- Cybersecurity (58)
- Information Technology Management and Leadership (46)
- Distributed Computing (44)
- Mobile Computing (43)
- BYOD (16)
- Policy and Law (16)
- Privacy (16)
- Mobile Policy (13)
- Data Security (12)
- Mobile Infrastructure (12)
- Mobile Support (12)
- Campus Policy and Law (9)
- Federal Policy and Law (9)
- Network Security and Applications (9)
- 30363 (8)
- Online Privacy (8)
- Networking and Emerging Technologies (7)
- Smartphones (7)
Information security takes on new dimensions in a mobile context. The protection of sensitive data, IT systems, and user privacy requires different strategies. Given the limited control colleges and universities have over the mobile devices and apps on campus, what solutions can institutions find to address issues of mobile security? Explore this resource site—a collection of all EDUCAUSE resources related to mobile security.
Articles, Papers, and Reports
- 7 Things You Should Know About Mobile Security, March 2011
An EDUCAUSE summary of the ways in which mobile computing amplifies some existing security concerns and introduces new ones, including issues surrounding user privacy.
Mobile Computing 5-Day Sprint—Day 4 Recap -- Security, Privacy, and Policy , June 2011
This brief summarizes day 4 of the EDUCAUSE Mobile Computing 5-Day Sprint, held April 25–29, 2011.
Mobile Internet Device Security Guidelines, June 2011
A wiki designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. This site is maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Ten Steps to Secure Your Mobile Device, August 2010
A wiki featuring advice about securing mobile devices and a list of links to additional resources about mobile security, maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Presentations and Seminars
Hot Topic Discussion: Mobility, Telecommuting, and the Cloud, April 2010
From the 2010 Security Professionals Conference, a presentation (including slides and a recording of the session) by Adam Goldstein and Joe St. Sauver that outlines the threats posed by mobile devices and measures that can limit the risk.
Location-Sharing Technologies: Privacy Risks and Controls, July 2010
An EDUCAUSE Live! web seminar with Lorrie Faith Cramor, who discusses the risks to user privacy posed by mobile devices, as well as strategies and tools that provide a level of control over how location-specific information is shared.
Mobile Computing: Safe or Sorry?, October 2010
A Point/Counterpoint presentation by Mark Bruhn and John Suess at the EDUCAUSE 2010 Annual Conference (including a video of the session and a shortened, audio version), in which the speakers debate strategies for securing mobile devices on campus.
Smartphone Privacy & Security: What Should We Teach Our Users?, April 2011Updated May 2012
In this session, an active researcher from Carnegie Mellon University will explore mobile privacy and security issues and suggest how campus policies can mitigate some of the larger risks.
Library Items on this Topic
EDUCAUSE Library Items for Mobile Security
- Top-Ten IT Issues in Higher Education: 2011 Current Issues Survey Results
June 1, 2011
In this year’s Current Issues Survey, mobile computing debuts as a top-ten higher education IT issue critical for strategic success and emerging across all issues is the need for IT leaders to…
- Smartphone Privacy & Security:- Webinar Audio
April 29, 2011
Information security takes on new dimensions in a mobile context. The protection of sensitive data, IT systems, and user privacy requires different strategies. Given the limited control colleges …
- Secure Mobile-an Oxymoron?
April 29, 2011
Responses to the #1 topic on IdeaScale, " Consumers dictate device usage, not IT, " indicate that MANY of you believe consumers will drive smartphone adoption in Higher Education, w…
- Is Your Mobile Phone Putting You At Risk?
April 28, 2011
Very small computing devices represent a new frontier in the computer security war. Mobile devices amplify existing security concerns while introducing a new set of risks, but most people have an…
- Mobile App Development Considerations--Some Things You Should Know
April 27, 2011
Users increasingly expect to be able to do virtually everything on a mobile device that they can do on a laptop (if not more ). The initial decision point for any mobile development program wo…
- Tune In April 21: Privacy Attacks and Defenses
April 14, 2011
Our online privacy seems to be under assault from all sides: by commercial organizations, by the government, by search engines and ISPs, and even by our cell phones—not to mention by criminals.…
- FireEye, Inc. and University of California, Berkeley - Combating Stealth Malware and Botnets in Higher Education
May 6, 2008
A session at the Security 2008
UC Berkeley's Electrical Engineering and Computer Sciences department wanted to strengthen security for mobile users on the wireless network. This talk will cover practical knowledge required …
- Seminar 2A - Wireless Security for Mobile Devices PLEASE NOTE: Separate registration and fee are required to attend this seminar.
April 10, 2007
A session at the Security 2007
Wireless devices and networks are increasingly ubiquitous, although attention to ensuring their security has been inadequate. Learn how to protect your campus users, mobile devices, and your wirele…