Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Why Two is Always Better than One, Especially When it Comes to Security

by GTI Editors
August 27, 2013
in Cybersecurity
Reading Time: 2 mins read
A A
Share on FacebookShare on Twitter

One of the fundamental things standing in the way of broader adoption of user-owned devices by federal agencies, usually referred to as BYOD, is fear, uncertainty, and doubt.

FUD

Despite the delightful onomatopoeia, neither fear, nor uncertainty, or doubt should be holding up the implementation of a strategy that has near-universal recognition for cost savings, improving employee productivity, and improving customer service.  But security, especially when dealing with the business of state, is a legitimate concern and does deserve some careful consideration.

Recently Nate Rushfinn took a look at how two factor authentication, a tried and true security strategy, could enable government agencies to embrace BYOD and start to realize the benefits that come with a more flexible technology environment.  For Rushfinn, the solution seems to lie not in Common Access Cards, but in the smart phone.  He suggests taking a look at how Google, Microsoft, and Twitter have improved their security via two factor authentication in recent months following high profile breaches and combine this with a closer look at authentication software and apps.

It’s an interesting idea and perhaps one that when combined with remote device wiping capabilities would provide a sufficiently robust layered defense to calm the fears of any federal agency CIO.

You can read Rushfinn’s entire post over at Nate’s Blog, by clicking here.

Tags: Application ManagementIdentity ManagementSecurityTwo Factor Authentication

RELATED POSTS

Future of Cybersecurity
Civilian

The Future of Cybersecurity Frameworks

April 27, 2022
Towards Zero Trust
Civilian

Moving Agencies Towards Zero Trust

April 26, 2022
Five Pillars
Civilian

The Five Pillars of Zero Trust Architecture

April 26, 2022
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5387 shares
    Share 2155 Tweet 1347
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    87 shares
    Share 35 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us