All About Personal Devices and Cybersecurity Risks

We live in a digitally connected world, where the use of personal devices such as smartphones, tablets, wearables, and non-University of Miami (UM) computers has become ubiquitous and part of our daily routines. While these devices offer unprecedented convenience and flexibility, they also pose significant risks to the security and integrity of UM data.

The Potential Risks of Personal Devices

One of the primary risks posed by the use of personal devices on UM networks is the potential for data breaches and unauthorized access. Personal devices often lack the robust security measures that UM managed systems have in place, making them more susceptible to malware, hacking attempts, and data leaks. If a device is compromised, it could serve as a gateway for cybercriminals to gain unauthorized access to sensitive University data, including research, intellectual property, medical, and student records.

Personal devices are frequently connected to a wide range of unsecured networks, including public Wi-Fi, which may lack proper encryption and security protocols. When personal devices are used to access UM resources or databases over unsecured networks, they become vulnerable to interception by malicious actors. This can result in the theft of login credentials, personal information, and confidential documents, putting both individuals and UM at risk.

Loss or theft of personal devices is a common occurrence, and when these devices store UM data, the consequences can be severe. Inadequate device encryption and weak password protection can expose sensitive information to anyone who gains physical access to the device.

Personal devices, which may not have the latest security updates or antivirus software, are more likely to fall victim to malware and phishing attacks. Cybercriminals can distribute malicious software via email attachments, compromised websites, or even fake apps. Once installed, these programs can harvest data, monitor activity, and even render the device unusable—disrupting both personal and UM-related tasks.

How the U Manages Cybersecurity with Personal Devices

Robust network security measures are in place on all UM campuses and facilities. Connections require device registration, encryption, and multi-factor authentication to safeguard data from unauthorized access.

UM and UHealth have clear policies regarding the use of personal devices on campus networks. These policies address required security practices, acceptable use guidelines, and sanctions for non-compliance.

In addition to these comprehensive policies, IT provides cybersecurity guidance and training, and implements advanced security measures to strike a balance between the convenience of personal devices and the protection of UM data.

The collaborative effort of all students, faculty, and staff is vital in building a secure digital environment that fosters learning, research, and innovation without compromising data integrity. More information is available at ISO's security articles hub and UHealth IT's cybersecurity articles archive.


Have questions? We're here to help!

If you have questions about cybersecurity, or if you want to learn more about how to stay safe online, contact the Information Security Office (ISO) at: infosec@miami.edu

Top