Smartphone security configuration

This document outlines some of the basic security steps that smartphone users should take to protect their information and the performance of their phones.

iPhone

  1. Ensure that the iPhone has been updated to the latest version of the iPhone OS. This can be done by syncing the phone using iTunes.

  2. Do not "jail-break" your iPhone as this removes some built-in security settings and can make your phone vulnerable to attacks.

  3. Use Active-Sync for checking e-mail/calendar/contacts on Emory Exchange. http://it.emory.edu/exchange-activesync

  4. Tap Settings/General/Passcode Lock. Set a password. Enable " Erase Data ". Warning: the "Erase Data" setting will delete your information from the phone after ten invalid password attempts.

  5. Tap Settings/General/Auto-Lock. Choose the auto-lock period (maximum of five minutes allowed by the iPhone).

  6. Tap Settings/General/Bluetooth. Turn off Bluetooth if it will not be used.

  7. Tap Settings/Safari. Ensure that Fraud Warning and Block Pop-ups are turned on.

Android

  1. Ensure that the phone has been updated to the latest version of Android OS available. This can be done through System Updates in Settings/About Phone.

  2. Use Exchange for checking e-mail/calendar/contacts on Emory Exchange. http://it.emory.edu/exchange-activesync

  3. Tap Settings/Security/Screen Lock. Set a password/pin/pattern.

  4. Tap Settings/Security/Automatically Lock. Choose the auto-lock period (maximum of thirty minutes allowed by Android).

  5. Tap Settings/Bluetooth. Turn off Bluetooth if it will not be used.

  6. Enter Chrome(or other default browser), go to Settings/Site Settings. Ensure that Pop-ups are blocked.

BlackBerry

  1. Use the Emory BlackBerry Enterprise Server for Exchange integration and management of advanced security features. http://it.emory.edu/exchange-blackberry

  2. Ensure that the BlackBerry is running the latest device software. Upgrades can be found on Verizon's website.

  3. Select Options/Owner. Include the following information: Name of the phone's owner, an alternative phone number to be contacted if the device is found, and a statement that says Property of Emory University/Healthcare .

  4. Select Options/Security Options/General Settings. Configure as follows:

    1. Password: Enabled (configure user assigned password as prompted. Password must be at least four characters in length.)

    2. Number of Password Attempts: 10 Warning: this setting will delete your information from the phone after ten invalid password attempts

    3. Security Timeout: Based on preference, but not more than 10 minutes.

    4. Allow Outgoing Calls While Locked: (This option should be based on the user's preference)

    5. Content Protection: Enabled

    6. Strength: Strong (or higher)

    7. Include Address Book: (This option is based on the user's preference. If enabled, the user will not be able to see their address book if they attempt to place a call while the phone is locked.)

  5. Select Options/Security Options/Firewall. Configure to Status: Enabled

  6. Select Options/Bluetooth. Ensure that it is disabled if the user will not be using Bluetooth devices. If Bluetooth is needed, ensure that it is set not to be discoverable.

Windows Mobile

  1. Ensure that the Treo is running the latest device software. Upgrades can be found on Verizon's website.

  2. Use Active-Sync for checking e-mail/calendar/contacts on Emory Exchange. http://it.emory.edu/exchange-activesync

  3. Select Start/Settings/Personal (tab)/Owner Information. Include the following information: Name of the phone's owner, an alternative phone number to be contacted if the device is found, and a statement that says Property of Emory University .

  4. Select Start/Settings/Personal (tab)/Lock. Choose the password type, and enter the password in the spaces provided. Check the box that says Prompt if device unused for and choose 10 minutes or less from the drop down menu.

  5. Select Start/Settings/Connections (tab)/Beam. Uncheck Receive all incoming beams if the user will not be beaming information to other Palm users.

  6. Select Start/Settings/Connections (tab)/Bluetooth. Ensure that Bluetooth is turned off if it is not being used. If Bluetooth will be used, make sure that the device is not discoverable.