Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Tip #11 Cell Phone Theft
    Cyber Security Awareness Month Tip

    Tip #11 Cell Phone Theft

    By Elizabeth CornellOctober 15, 2015Updated:October 30, 20152 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link
    Cell Phone Theft
    Image: “Numbers of stolen cell phones growing fast around the country,” The Droid Guy

     

     

    Thousands of cell phones are stolen and infiltrated every month. Even some Fordham students have been victims of this crime. Once a cell phone is hacked, the thief has access to a huge amount of personal information. So take heed! Follow these practical measures to avoid becoming a target.

    • Use your phone’s security lock code to create a unique pass code.
    • Disable bluetooth on your phone if not in use.
    • Make sure to only unlock the phone when you need to use it.
    • Do not lend your mobile phone to strangers on the pretext of an emergency situation. They may slip away with it before you know it.
    • Immediately report a lost or stolen phone to your service provider and to the police, and insist on an acknowledgment.
    • If you are a member of the Fordham community, report your theft to IT Customer Care at 718-817-3999 or HelpIT@fordham.edu
    • When not in use, keep your phone out of sight—in your pocket, backpack, or handbag.
    • Do not, by any means, leave your cell phone unattended.
    • Avoid disclosing the relationship between you and the people in your contact list. Avoid using names like “Home,” “Honey,”Hubby,” “Mom,” or “Dad.” Criminals might attempt to contact these individuals to extract more of your personal information.

    Make sure your phone is secure. And if you get some weird-sounding texts from a friend or family member, get in touch with them in some other way before you respond.

    For more information about cell phone theft, read “How to Deter Smartphone Thefts and Protect Your Data” from CTIA, the Wireless Association.

     

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    cell phones Exploits and Vulnerabilities Mobile Phishing Security Awareness Wireless
    Previous ArticlePhishing Email With No Subject Sent to the Fordham Community on 10/14/2015
    Next Article Tip #12 The Upshot on Updates

    Related Posts

    10 Critical Network Pentest Findings IT Teams Overlook

    Password Reuse Epidemic: Nearly Half of User Logins Compromised

    Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d