The University of Texas at Dallas
close menu

Portable Computing Device Security

Nate Howe & Chris Giles

March 4, 2021

Woman working on laptop

Students are increasingly dependent upon portable computing devices to support their education goals. As more students experience online classes, bedrooms and patios are becoming the new classrooms. Families have rapidly added computing equipment and capacity to their homes, and these changes bring about new challenges in information security. Cybercriminals have taken note and are adjusting their tactics to exploit and profit from college students.

Cybercrime is not only an attack on technology – it is also an attack on people, processes, and facilities. Students are supported by several teams at UT Dallas who are available to answer questions and deliver services that enable student success. The list of security measures offered below will help students protect their technology so they can focus on education, rather than disruptions from a security incident.

  • Physical Security – If you will be away from your personal devices, make sure that you identify secure storage. If you have a vehicle, place valuables out of sight (such as under the seat or in the trunk) and lock the vehicle. Even if you have adequate storage, ensure that you have set a difficult-to-guess passphrase to unlock each device.
  • Networking Hardening – When configuring home network equipment, such as wireless routers, be certain to change the default password that comes with the device to a difficult-to-guess passphrase. Remember to adjust the encryption protocol to WPA2 or newer, and routinely install available firmware updates. Lastly, avoid using open wireless access points (such as the Wi-Fi available at coffee shops), or unknown access points (such as a neighbor’s Wi-Fi).
  • Patch Management – Ensure that computing devices are running supported operating systems, and that the operative system and all applications within the device receive security updates. Many devices and applications offer automatic update features. At UT Dallas, you will be using Microsoft Office and perhaps VPN software to complete your studies – these are available to you at no additional cost.
  • Malware Protection – Windows has built-in anti-malware protection in the form of Microsoft Defender; for macOS we recommend Avast’s free software. Windows and macOS offer host-based firewall functionality – ensure you enable it.
  • Social Engineering – Take responsibility for validating communications and be vigilant and skeptical in order to avoid being victimized by scammers. These criminals misrepresent themselves as persons of authority or potential employers in order to steal your data or get you to perform some action, such as money laundering. The criminals may try to contact you by email, text message, or phone call. Beware a sense of urgency which could be a tactic to pressure you into a dangerous scenario. When in doubt about a communication, remember to pause and chat with a trusted friend about your concerns.
  • Computing Device Hardening – Periodically assess whether installed software is still needed or can be removed. In fact, disable any software or features you consider unnecessary on your device. Use longer passphrases rather than passwords and enable two-factor authentication features on applications that offers such functionality. If your device offers remote location and deletion features (such of Apple’s Find My service), make sure that it is enabled and you know how to use it during an emergency.
  • Backups – Restoring a critical file or an entire computing device requires that a backup copy exists. Develop a backup plan in case of hardware failure, stolen device or malware infection. You can leverage services provided by UT Dallas, such as Box and OneDrive, to reduce risk of keeping files locally on your portable computing device.
  • Disk Encryption – If a device is lost or stolen, the files stored within it may be visible to attackers if not encrypted. Protection such as BitLocker for Windows and FileVault for macOS should be considered – just be sure you have your backup strategy in place, in case the encryption malfunctions.
  • Data Destruction – When it is time to sell or dispose of a device, be sure to delete all data within the device by erasing your storage drive or resetting the device to factory settings. In some cases, erasing is not enough, and the device should be overwritten. Work with an IT specialist to determine the best approach for your situation.
  • Remote Meetings – During virtual meetings, be sure to check that there are no unexpected participants in the meeting. Additionally, consider using headphones and be careful not to give out confidential information while speaking. Be conscious of settings which enable and disable your microphone and camera, to avoid an embarrassing situation.
  • Passphrases – Use longer and more complex passphrases instead of simple and short passwords. Additionally, use different ones for every website or application. Password management tools are available to you through UT Dallas if you contact infosecurity@utdallas.edu.
  • Technical Support – Dedicated professionals of the Office of Information Technology and Information Security Office are available to help you. Initial contact should be directed to the UTD Help Desk, available by emailing assist@utdallas.edu or calling 972-883-2911.


You are now a member of the UT Dallas community and responsible for using its resources in an ethical and legal manner. The guidelines above are a great way to protect data and have a great experience with portable computing devices during your UT Dallas education experience. All users agree to certain policies as well, including UTDBP3096. Be sure to read this policy and avoid doing anything illegal – like downloading pirated videos, cracking software licenses, or violating license agreements for software. Students are also not allowed to attack or probe UT Dallas networks without explicit approval from the Information Security Office. Take responsibility for your device and be careful when sharing it because you may be held responsible for all activities appearing to originate from your device or user account.

We hope our fellow Comets can benefit from these guidelines both on campus and when studying remotely. If you have any questions or feedback, contact us at infosecurity@utdallas.ed.