Mobile devices

Mobile devices

As mobile devices and smartphones have become more common, new possibilities and new challenges have arisen. One of the greatest challenges is information security, the importance of which is emphasised as the amount of data and ways of using the systems are expanding. Although the importance of technical information security must not be underestimated, a large part of information security consists of the user’s own actions. These instructions include the best practices concerning the security of smartphones. This list is not designed to be a comprehensive set of information security instructions, but more as an easy-to-read checklist of things to remember.

If you are purchasing a new phone, your phone is lost or stolen, you need a new SIM card or you are heading abroad, detailed instructions are available in Flamma.

Implementation of a smartphone

Remember that the use of the university’s phones is governed by the terms of use as well. The phone, similar to computers, is meant to be used as a tool in studying, research and management. Minor use for personal purposes is allowed. In addition, it is important to remember that storing material that infringes copyrights in a phone or anywhere else in the university is forbidden.

When you receive your new smartphone, nearly all of its information security settings are off (except for the PIN code of the SIM card).

Instructions concerning mobile devices

Office 365 in mobile devices

Information security

Information security of mobile devices. There is information on the information security of mobile devices in Helpdesk’s general information security instructions.

If your phone gets lost or stolen

Multifactor authentication (MFA)

Multifactor Authentication (MFA) for Microsoft Office 365 services (e.g. Outlook, Teams, OneDrive) will gradually become mandatory at the University of Helsinki during 2021. Multifactor Authentication will significantly enhance IT security at the university and safeguard university user accounts better than before.

You need a mobile device for the authentication. Read further instructions here

Give feedback

The instructions site of the University of Helsinki's IT Helpdesk helps you with IT-related issues related to your work. Let us know how we can improve our instructions. We greatly appreciate your feedback!

How would you improve these instructions?
Back to top