Skip to main content

Trinity College Dublin, The University of Dublin

Trinity Menu Trinity Search

You are here News

Protecting Your Mobile Device

10 tips to protect your device

Smartphones and tablets are essentially mobile computers. They allow you to access the internet and email, download applications and games, store photos, videos and your personal information.

It is important to protect and secure your phone just as you would your home computer or laptop.

Here are ten essential tips for protecting and securing your device:

  1. Set a password - This is the most effective security measure that you can take in the event that your device is lost or stolen.
  2. Set an automatic lock - Most devices can be configured to automatically lock if it has not been used for a set period of time. An automatic lock is a strong control to have in place to prevent unauthorised access to your data.
  3. Regularly update the software - Phone and tablet manufacturers regularly issue updates to the software on your phone, some of which may be fixing known security issues.
  4. Encrypt your data - Some phones or tablets allow you to encrypt your data. Sometimes this functionality is built in and sometimes third-party software is available. Encryption secures your data if your device is lost or stolen.
  5. Use remote tracking or data deletion - This type of service, if available, will give you piece of mind in the event that the device is lost or stolen.
  6. Disable Bluetooth - Switch your Bluetooth device to hidden mode, so that it is only visible when you specifically need other people or devices to see it. This means that hackers cannot easily see your phone and attempt to connect to it.
  7. Wipe your device before discarding Delete all information stored in a device prior to discarding, exchanging or donating it to charity. In particular you should remove any Trinity Wi-Fi or email settings you have stored.
  8. Report lost or stolen devices - If you lose your device, it may be possible to remotely wipe personal data from it. For example, staff would be able to make use of a feature through the staff Exchange email service to remotely wipe the device. For more information please contact the IT Service Desk.
  9. Use an encrypted network - Use a network that requires a password and is operated by a reputable provider when connecting to Wi-Fi. Configure your settings so that that your phone asks permission to join a new wireless network.
  10. Do not store confidential information on insecure devices - Do not store confidential information on devices which cannot be securely configured. This includes your own private personal information and confidential Trinity documents.

For further information, visit