Statistics show that you are more likely to lose your mobile device than have it infected by a cyber attacker. For this reason, you should always enable a screen lock on all mobile devices. Screen lock protection ensures that only you can access the data on your mobile device.
Common screen locks include:
- Strong passcode
- Swipe pattern
- Fingerprint
- Facial recognition
All mobile devices used to access institutional information systems and data must be configured to:
- Lock when not in use
- Unlock with the use of a secure authentication method
- Remotely wipe institutional data stored on the device
Configure your screen lock so that it locks automatically after a short period of inactivity. Enabling a screen lock is key for protecting your devices, but, if you lose your device, even with screen lock enabled, be sure to report it stolen right away to your supervisor and equipment coordinator. If the device contains institutional data, notify the Chief Information Security Officer and/or ITS Security Operations Center at 509-335-0404. Please see BPPM 87.10 Mobile Device Management – WSU-Owned Mobile Devices.
Questions? Contact: