{"id":33221,"date":"2008-10-23T00:00:00","date_gmt":"2008-10-23T05:00:00","guid":{"rendered":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/"},"modified":"2008-10-23T00:00:00","modified_gmt":"2008-10-23T05:00:00","slug":"discussing-cyber-security-mobile-devices","status":"publish","type":"post","link":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/","title":{"rendered":"Discussing cyber security &#8212; mobile devices"},"content":{"rendered":"<div class=\"panel body-content\"><div class=\"panel__container\"><p><I>(EDITOR&#8217;S NOTE: October is National Cyber Security Awareness as Month. The following is the second in a series of stories from UNMC Information Technology Services that highlight aspects of cyber security.)<\/I><\/p>\n<p>Here are some tips for protecting information on your mobile devices. <\/p>\n<p>ITS recommends confidential information be stored on centrally supported file servers rather than mobile devices or even individual workstation hard drives.<\/p>\n<p>Mobile devices include PDAs, laptops, pagers, cell phones with text pages, Blackberry devices, flash drives, USB stick, zip drives and CDs. While these devices are efficient to use, they also can present a security risk if proper precautions are not taken to protect the information contained on them. <\/p>\n<p>Technical safeguards such as encryption and strong passwords must be utilized when available to prevent improper access to the information stored on the mobile device. (Note: Encryption is the translation of data into a secret code. A strong password is difficult to guess by other people.) <\/p>\n<p>Physical safeguards offer protection, such as locking the device in a drawer, glove box, car trunk, or storing the device out of sight when not in use. Never leave a mobile device unattended, even for a short period of time. It takes a thief only a matter of seconds to steal valuable possessions. <\/p>\n<p>If you have a mobile device and it is lost or stolen, immediately report the theft to campus security or the Help Desk.  <\/p>\n<p>The theft of confidential information contained on the devices could cause serious harm. Implement the simple safeguards above to reduce this risk.<\/p>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Some tips for protecting information on your mobile devices. <\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-33221","post","type-post","status-publish","format-standard","hentry","category-uncategorized","department-unmc-today-todays-headlines","author_override-story-contributed-by-unmc-information-technology-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Discussing cyber security -- mobile devices<\/title>\n<meta name=\"description\" content=\"Some tips for protecting information on your mobile devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Discussing cyber security -- mobile devices\" \/>\n<meta property=\"og:description\" content=\"Some tips for protecting information on your mobile devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Newsroom\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/unmcedu\" \/>\n<meta property=\"article:published_time\" content=\"2008-10-23T05:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Karen Burbach\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unmc\" \/>\n<meta name=\"twitter:site\" content=\"@unmc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Karen Burbach\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/\"},\"author\":{\"name\":\"Karen Burbach\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/person\/ee8fa869fc007fb3f02acf871a6c41d8\"},\"headline\":\"Discussing cyber security &#8212; mobile devices\",\"datePublished\":\"2008-10-23T05:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/\"},\"wordCount\":262,\"publisher\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/\",\"url\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/\",\"name\":\"Discussing cyber security -- mobile devices\",\"isPartOf\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#website\"},\"datePublished\":\"2008-10-23T05:00:00+00:00\",\"description\":\"Some tips for protecting information on your mobile devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.unmc.edu\/newsroom\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Discussing cyber security &#8212; mobile devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#website\",\"url\":\"https:\/\/www.unmc.edu\/newsroom\/\",\"name\":\"Newsroom\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.unmc.edu\/newsroom\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#organization\",\"name\":\"University of Nebraska Medical Center\",\"url\":\"https:\/\/www.unmc.edu\/newsroom\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/overview-1.png\",\"contentUrl\":\"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/overview-1.png\",\"width\":500,\"height\":153,\"caption\":\"University of Nebraska Medical Center\"},\"image\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/unmcedu\",\"https:\/\/x.com\/unmc\",\"https:\/\/instagram.com\/iamunmc\",\"https:\/\/www.youtube.com\/user\/UNMCEDU\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/person\/ee8fa869fc007fb3f02acf871a6c41d8\",\"name\":\"Karen Burbach\",\"url\":\"https:\/\/www.unmc.edu\/newsroom\/author\/45c48cce2e2d7fbdea1afc51c7c6ad26\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Discussing cyber security -- mobile devices","description":"Some tips for protecting information on your mobile devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/","og_locale":"en_US","og_type":"article","og_title":"Discussing cyber security -- mobile devices","og_description":"Some tips for protecting information on your mobile devices.","og_url":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/","og_site_name":"Newsroom","article_publisher":"https:\/\/www.facebook.com\/unmcedu","article_published_time":"2008-10-23T05:00:00+00:00","author":"Karen Burbach","twitter_card":"summary_large_image","twitter_creator":"@unmc","twitter_site":"@unmc","twitter_misc":{"Written by":"Karen Burbach","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/#article","isPartOf":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/"},"author":{"name":"Karen Burbach","@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/person\/ee8fa869fc007fb3f02acf871a6c41d8"},"headline":"Discussing cyber security &#8212; mobile devices","datePublished":"2008-10-23T05:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/"},"wordCount":262,"publisher":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#organization"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/","url":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/","name":"Discussing cyber security -- mobile devices","isPartOf":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#website"},"datePublished":"2008-10-23T05:00:00+00:00","description":"Some tips for protecting information on your mobile devices.","breadcrumb":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/23\/discussing-cyber-security-mobile-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.unmc.edu\/newsroom\/"},{"@type":"ListItem","position":2,"name":"Discussing cyber security &#8212; mobile devices"}]},{"@type":"WebSite","@id":"https:\/\/www.unmc.edu\/newsroom\/#website","url":"https:\/\/www.unmc.edu\/newsroom\/","name":"Newsroom","description":"","publisher":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.unmc.edu\/newsroom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.unmc.edu\/newsroom\/#organization","name":"University of Nebraska Medical Center","url":"https:\/\/www.unmc.edu\/newsroom\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/logo\/image\/","url":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/overview-1.png","contentUrl":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/overview-1.png","width":500,"height":153,"caption":"University of Nebraska Medical Center"},"image":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/unmcedu","https:\/\/x.com\/unmc","https:\/\/instagram.com\/iamunmc","https:\/\/www.youtube.com\/user\/UNMCEDU"]},{"@type":"Person","@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/person\/ee8fa869fc007fb3f02acf871a6c41d8","name":"Karen Burbach","url":"https:\/\/www.unmc.edu\/newsroom\/author\/45c48cce2e2d7fbdea1afc51c7c6ad26\/"}]}},"_links":{"self":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/posts\/33221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/comments?post=33221"}],"version-history":[{"count":0,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/posts\/33221\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/media?parent=33221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/categories?post=33221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/tags?post=33221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}