Access Keys:
Skip to content (Access Key - 0)

Mobile and Portable Device Security Practices Landing Page

This page is under construction
The information provided below may not be complete or fully tested. Take care when following draft instructions.

On this page:

Overview

Protecting your mobile devices involves more than just putting a password/pin on them. You can also set up remote wipe, geolocation services, and get your laptops/tablets registered and tagged.

How to set up Remote Wipe

iOS 1

Platform 2

Obtaining information and links.

Platform 3

Obtaining information and links.

Tagging

Laptops and other small electronic devices can be tagged with the STOP tag. This loss prevention measure is a visual deterrent to stealing electronic devices. Laptop tagging is now FREE for the MIT community, and is offered at the IS&T Service Desk at the Atlas Center in E17-106.

See Also

  • external link to more information from vendor/other sources
  • external link to more information from vendor/other sources
  • external link to more information from vendor/other sources

Have Questions or Still Need Help?

IS&T Contributions

Documentation and information provided by IS&T staff members


Last Modified:

May 23, 2018

Get Help

Request help
from the Help Desk
Report a security incident
to the Security Team
Labels:
infoprotect infoprotect Delete
Enter labels to add to this page:
Please wait 
Looking for a label? Just start typing.
Feedback
This product/service is:
Easy to use
Average
Difficult to use

This article is:
Helpful
Inaccurate
Obsolete
Adaptavist Theme Builder (4.2.3) Powered by Atlassian Confluence 3.5.13, the Enterprise Wiki