Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Mobile Apps and Devices are Biggest Threats to Federal Information Security, but Help is at Hand

by Jenna Sindle
September 12, 2017
in Cybersecurity
Reading Time: 4 mins read
A A
Mobile
Share on FacebookShare on Twitter

We all know about the cyber threats presented by networks and connected devices, but did you know that one of the greatest threats to information security, especially for federal government agencies, comes from mobile devices?

In a study released in April 2017, the Department of Homeland Security (DHS) the authors noted that threats to mobile devices are “real and exist across all elements of the mobile ecosystem.”  Because of the “enhanced capabilities [and] the ubiquity and diversity of mobile applications and … the use of the devices outside the agency’s traditional network boundaries” that a new approach to security – distinct from desktop security protocols — needs to be developed and implemented.

The primary value of a mobile device for an attacker – be they a nation state actor or malicious insider – is to use the mobile device as a backdoor into agency networks.  Once access is gained, the attacker may gain the ability to exfiltrate data, or to leave malware to trigger events like a ransomware attacks to identify just a couple of likely threats to personal and national data security.

While the DHS is forming a Science and Technology directive to drive and deliver mobile application security protocols, for both users and developers, because the threat to federal agencies is both real and imminent, what are some actions that federal agencies can take now to improve mobile security?

Tim LeMaster, Director of Systems Engineering at Lookout, a leading mobile security company, noted that there are some key areas of mobile security that federal CIOs should concentrate on regardless of whether users bring their own device or use agency issued devices.  “The four big threats are 1) application threats such as malware and other risky apps that can compromise sensitive data on the device, 2) device threats such as running an unpatched version of the OS or a jailbroken device, 3) Network threats such as MITM attacks, and 4) web based threats such as phishing, but really come down to a lack of visibility,” said Le Master in a recent interview with Federal Technology Insider.

The key to mitigating those threats is really visibility, the ability to tap into resources that provide comprehensive insight into over-the-horizon threats and the ability to leverage automation to ensure compliance at all times. “When it comes to mobile device and app security if you don’t have visibility, you’ve already lost,” LeMaster shared.  He continued, “agencies must be able to not only secure mobile apps and endpoints at the moment they are deployed or join the network, but they must also be able to have that continuous monitoring to be on guard for new threats.”

From his experience in the field, being able to utilize over-the-horizon information about threats is another essential component to a mobile security strategy.  “Leveraging a large sensor network of over 120 million devices gives me the visibility into global threats and trends. “If you have insight that can show you threats to mobile infrastructure, you can get ahead of it, and leveraging cloud-based analysis allows quick reaction to new and evolving threats without the need to update a device client to protect users.”

While no one will ever claim that ensuring the security and integrity of mobile devices and apps is an easy task – especially not for federal CIOs – being aware of the threats and of solutions that can mitigate them now is a mission-critical advantage.

Interested in learning more about next-generation solutions for mobile security?  You can download a guide to understanding risk in mobile environments here.

Tags: App SecurityBYOD device securitycyber securitycybersecurityData SecurityDepartment of Homeland Securitydevice securityDHSDHS mobile security studyinformation securitymobile app securitymobile securityTim LeMaster

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022
Balancing Security and Customer Experience for Digital Government
CX Service and Delivery

Balancing Security and Customer Experience for Digital Government

June 20, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5353 shares
    Share 2141 Tweet 1338
  • Customer and Industry Partnerships Are Helping Deliver 5G Solutions to Federal Agencies

    102 shares
    Share 41 Tweet 26
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    40 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    11 shares
    Share 4 Tweet 3
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us