{"id":582,"date":"2012-10-23T08:00:23","date_gmt":"2012-10-23T15:00:23","guid":{"rendered":"http:\/\/blogs.oregonstate.edu\/emdug\/?p=582"},"modified":"2012-10-22T10:35:57","modified_gmt":"2012-10-22T17:35:57","slug":"mobile-device-security","status":"publish","type":"post","link":"https:\/\/dev.blogs.oregonstate.edu\/emdug\/2012\/10\/23\/mobile-device-security\/","title":{"rendered":"Mobile Device Security"},"content":{"rendered":"<p><a href=\"http:\/\/blogs.oregonstate.edu\/emdug\/files\/2012\/10\/secure_iphone.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-590\" title=\"secure_iphone\" src=\"http:\/\/blogs.oregonstate.edu\/emdug\/files\/2012\/10\/secure_iphone-200x300.png\" alt=\"screenshot of iPhone passcode lock settings\" width=\"200\" height=\"300\" srcset=\"https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/1279\/files\/2012\/10\/secure_iphone-200x300.png 200w, https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/1279\/files\/2012\/10\/secure_iphone.png 320w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a>Mobile devices are great. You can have access to your work email, important contacts, calendars&#8230; and so can hackers and <a title=\"Thefts of cell phones rise rapidly nationwide\" href=\"http:\/\/http:\/\/www.usatoday.com\/story\/tech\/2012\/10\/20\/thefts-of-cell-phones-rise-rapidly-nationwide\/1646767\/\" target=\"_blank\">thieves<\/a> if you&#8217;re not careful. Find out how to secure your devices and protect yourself:<\/p>\n<p><a href=\"http:\/\/www.allvoices.com\/contributed-news\/13235051-is-your-mobile-device-really-secure\" target=\"_blank\">Is Your Mobile Device Really Secure?<\/a><\/p>\n<p><a href=\"http:\/\/www.usatoday.com\/story\/tech\/personal\/2012\/10\/21\/missing-smartphone-android-iphone\/1640875\/\" target=\"_blank\">Techlicious: how to track a missing smartphone<\/a><\/p>\n<p><a href=\"https:\/\/blink.ucsd.edu\/technology\/security\/mobile-security.html\">Secure Your Mobile Devices<\/a><\/p>\n<p><a href=\"http:\/\/www.alertboot.com\/blog\/blogs\/endpoint_security\/archive\/2012\/10\/15\/mobile-device-security-internet-crime-complaint-center-issues-warning-and-safety-tips.aspx\" target=\"_blank\">Mobile Device Security: Internet Crime Complaint Center Issues Warning And Safety Tips<\/a><\/p>\n<p><a href=\"http:\/\/www.infoworld.com\/d\/mobile-technology\/3-easy-steps-more-secure-iphone-or-ipad-204930\" target=\"_blank\">3 easy steps to a more secure iPhone or iPad<\/a><\/p>\n<p><a href=\"http:\/\/www.snappli.com\/blog\/7-tips-for-keeping-your-iphone-safe-secure\/\" target=\"_blank\">7 Tips for Keeping Your iPhone Safe &amp; Secure<\/a><\/p>\n<p><a href=\"http:\/\/www.businessinsider.com\/10-awesome-apps-to-secure-your-smartphone-2012-10?op=1\" target=\"_blank\">10 Awesome Apps To Protect Your Smartphone<\/a><\/p>\n<p><a href=\"http:\/\/reviews.cnet.co.uk\/mobile-apps\/how-to-improve-your-android-security-50009497\/\" target=\"_blank\">How to improve your Android security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile devices are great. You can have access to your work email, important contacts, calendars&#8230; and so can hackers and thieves if you&#8217;re not careful. Find out how to secure your devices and protect yourself: Is Your Mobile Device Really Secure? Techlicious: how to track a missing smartphone Secure Your Mobile Devices Mobile Device Security:&hellip; <a href=\"https:\/\/dev.blogs.oregonstate.edu\/emdug\/2012\/10\/23\/mobile-device-security\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3624,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3223],"tags":[],"class_list":["post-582","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/dev.blogs.oregonstate.edu\/emdug\/wp-json\/wp\/v2\/posts\/582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.blogs.oregonstate.edu\/emdug\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.blogs.oregonstate.edu\/emdug\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.blogs.oregonstate.edu\/emdug\/wp-json\/wp\/v2\/users\/3624"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.blogs.oregonstate.edu\/emdug\/wp-json\/wp\/v2\/comments?post=582"}],"version-history":[{"count":15,"href":"https:\/\/dev.blogs.oregonstate.edu\/emdug\/wp-json\/wp\/v2\/posts\/582\/revisions"}],"predecessor-version":[{"id":598,"href":"https:\/\/dev.blogs.oregonstate.edu\/emdug\/wp-json\/wp\/v2\/posts\/582\/revisions\/598"}],"wp:attachment":[{"href":"https:\/\/dev.blogs.oregonstate.edu\/emdug\/wp-json\/wp\/v2\/media?parent=582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.blogs.oregonstate.edu\/emdug\/wp-json\/wp\/v2\/categories?post=582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.blogs.oregonstate.edu\/emdug\/wp-json\/wp\/v2\/tags?post=582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}