The information security of mobile devices is mainly the responsibility of the users themselves. Here are some tips on what you should consider.
The information security of a mobile device requires that you use a PIN code on the device. The PIN code is a property of the SIM card, which protects the SIM card and the subscription against illegal use.
The PIN code is usually initially 1234 or 0000 (depending on the operator). Change it immediately when you start using the phone. Choose a number code which is difficult to guess as the PIN code. Do not use your own birthdate or that of your loved ones, your phone number or any other number which is easy to guess. Read the instructions on how to change the PIN code in the instructions manual of the device or on the device manufacturer’s website.
Using automatic locking
Automatic locking of the phone is a convenient feature as the phone is locked against unauthorized use, but you can still answer any incoming calls without unlocking the device. Read the instructions on how to use the automatic locking feature in the instructions manual of the device or on the device manufacturer’s website.
Keep you device updated
Make sure that the operating system and applications of your device stay up to date. Read the update instructions in the instructions manual of the device or on the device manufacturer’s website.
Remote positioning of the phone
Modern smartphones currently offer the possibility of positioning a lost phone. Read more about remote positioning in the instructions manual of the device or on the device manufacturer’s website.
Using remote locking of the phone
You should enable remote locking of the phone in case the phone is stolen or gets lost. The remote locking feature allows you to lock the phone when it has gone missing or been stolen. Read more about remote locking in the instructions manual of the device or on the device manufacturer’s website.
Remote wiping of the phone
You can remote wipe your devices empty by following these instructions (in Finnish).
Information security in Office 365
When you take the university’s Office 365 service into use with a mobile device, you simultaneously grant administration the right to remotely wipe the device in question. This concerns devices owned by the University of Helsinki as well as privately purchased smartphones and tablets, but not computers.
Administration will only use this right when there is a reasonable cause to suspect that the device has fallen into the wrongs hands (e.g. it has been stolen) and it is possible that important data will also fall into the wrong hands. The identity of the person requesting the remote wipe is checked. Measures taken by administrators to a phone are gathered as log information.
You can also remote wipe your device yourself, see the instructions (in Finnish).
If you do not wish to grant the rights, you can read your e-mail and use the calendar in the browser.
The instructions site of the University of Helsinki's IT Helpdesk helps you with IT-related issues related to your work. Let us know how we can improve our instructions. We greatly appreciate your feedback!How would you improve these instructions?