Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Are the Security Risks too Great? Mobile Devices and the Public Sector

by Jenna Sindle
August 6, 2019
in Cybersecurity
Reading Time: 4 mins read
A A
mobile devices
Share on FacebookShare on Twitter

Smart phones and tablets have been an integral part of our home and work lives for over a decade. And, while government agencies were initially slow to adopt mobile platforms, they are now integral to citizen experience and mission success.

“Today mobility is on the bleeding edge of all aspects of government work, however too many agencies do not recognize this trend and, as a result, do not include mobility at the top of their list when it comes to IT security risk assessment or planning,” shared Bryan Schromsky, Managing Director of Verizon Connected Solutions.

In fact, 82 percent of agencies say that mobile devices present serious risks to mission integrity. Having heard these concerns from their public sector customers, the cyber security team at Verizon Federal Solutions assessed the risks posed by mobile devices and developed guidance to help federal IT leaders reap the rewards of mobile devices while helping to mitigate their risk.

Download the Survey Now

 

Based on interviews with over 600 professionals, the index confirmed the trend noticed by federal agencies and revealed important insights about why mobile devices present a significant security risk for the public sector. What became clear was that cyber attackers aren’t interested in mobile devices because of the data they hold, they’re interested in them as a gateway to access core business systems. It’s these core systems and applications that hold far more lucrative information, including citizen’s personally identifiable information, national security secrets, and other highly sensitive – and highly valuable – data. As federal government agencies become more reliant on mobile devices to meet the mission, the more opportunities there are for them to be compromised and used as an      access point for a serious breach.

What steps can public sector organizations take to mitigate this risk that don’t involve abandoning mobile device use?

Bryan suggests three steps that all public sector organizations should take:

  • Educate End Users: The Mobile Security Index clearly showed that while agencies were highly confident in their ability to identify a compromised device and respond to an attack. However, with more than one in three agencies being the victims of a mobile device-based attack in the last year, and with only in ten agencies reporting that there highly confident of their employees’ knowledge of mobile security, there’s still work to be done.
  • Establish an Acceptable Use Policy (AUP): An AUP or Mobile Device Management policy, establishes how agency workers can, and can’t, use their mobile devices. Federal agencies, including the Department of Treasury, the National Oceanic and Atmospheric Administration (NOAA), and the National Institutes of Health are among the agencies that have clear use policies covering use of agency-issued devices as well as acceptable use of personal devices.
  • Unify Endpoint Management: Unified Endpoint Management (UEM) empowers the user to overcome the challenges of deploying and managing mobility services through a single portal. Using the portal, features of a mobile device can be enabled, or disabled, as needed. By removing unnecessary functionality, security risks are lowered. The risk of an accidental compromise is also lowered.

In closing our conversation, Bryan     shared a thought-provoking twist on the mobility-security equation, turning it on its head. “Mobility services can provide better security capabilities for government agencies.  Mobility enables agencies to use other factors in granting access to sensitive information; for instance, an agency can use a device’s GPS location, biometric authentication or a second piece of hardware validation.”

Download the Survey Now

Tags: Department of TreasuryEndpoint Managementendpoint securityInternet of ThingsIoT SecurityMobile Device Securitymobile securityMobile Security IndexNIHnoaaSmart City SecurityUEMUnified Endpoint ManagementVeterans Affairs

RELATED POSTS

Federal Healthcare: Overcoming Data Challenges Drives Mission Success
Civilian

Federal Healthcare: Overcoming Data Challenges Drives Mission Success

March 11, 2022
Big Data Program
Civilian

The Big Data Program: How the National Oceanic and Atmospheric Administration is Expanding Public Access

December 16, 2021
Hybrid Work Environment
Dell Technologies - Be Ready for What's Next

5 Elements to Future-Proof Your Agency’s Hybrid Work Environment

November 3, 2021

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5370 shares
    Share 2148 Tweet 1343
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    41 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3
  • Customer and Industry Partnerships Are Helping Deliver 5G Solutions to Federal Agencies

    102 shares
    Share 41 Tweet 26
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us