Federal Government Facing Mobile Security Challenges

https://i2.wp.com/www.securityweek.com/sites/default/files/Mobile-Malware.jpgA report from Telework Exchange, sponsored by EMC, VMware, Cisco, and Carahsoft, shows that Federal employees are taking advantage of the BYOD bandwagon, but at the cost of higher risk to their respective agencies.

In their 2013 Digital Dilemma Report, Telework Exchange says that more than half of the smartphone users in the Federal government use their personal smartphone for job-related tasks. Yet, one in three workers do not have password protection. While mobile devices create a great opportunity for productivity gains, the report says, agencies must address current behaviors to ensure government data is not in danger.

Mobile Device Security”We can all agree employees are mobile. It is our responsibility to ensure access to government data is secure,” said Cindy Auten, general manager of Telework Exchange.

In addition to password protection issues, another note from the study shows that 85 percent of the Federal employees included have downloaded an app to their personal smartphone or tablet, which exposes the device, its data, and the user to a greater level of risk, depending on the nature of the application. According to a recent GAO report, malware attacks directed at mobile devices increased by 185 percent in less than a year.

Other items from the report include the fact that just 11% of the agencies represented have some sort of BYOD policy in place, despite the fact that 55% of the employees surveyed use their own personal devices for work. Moreover, only 27% of the mobile devices being used have access to multi-factor authentication and secure remote connections to the employee’s agency.

“IT transformation, helped by the adoption of mobile computing, is at an all time high within the Federal government,” said Kyle Keller, federal cloud business director at EMC Corporation.

“As more Federal employees introduce their own smartphones, tablets, and other mobile devices to work, managing these devices over an IT infrastructure they can trust becomes crucial. Implementation of policy, training and technology will be necessary to ensure the best security and control in this new era of increased mobility.”

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of the author. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided "as-is". The author shall not be liable for any damages whatsoever arising out of the content or use of this blog.
%d bloggers like this: