Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Are the Security Risks too Great? Mobile Devices and the Public Sector

by Jenna Sindle
August 6, 2019
in Cybersecurity
Reading Time: 4 mins read
A A
mobile devices
Share on FacebookShare on Twitter

Smart phones and tablets have been an integral part of our home and work lives for over a decade. And, while government agencies were initially slow to adopt mobile platforms, they are now integral to citizen experience and mission success.

“Today mobility is on the bleeding edge of all aspects of government work, however too many agencies do not recognize this trend and, as a result, do not include mobility at the top of their list when it comes to IT security risk assessment or planning,” shared Bryan Schromsky, Managing Director of Verizon Connected Solutions.

In fact, 82 percent of agencies say that mobile devices present serious risks to mission integrity. Having heard these concerns from their public sector customers, the cyber security team at Verizon Federal Solutions assessed the risks posed by mobile devices and developed guidance to help federal IT leaders reap the rewards of mobile devices while helping to mitigate their risk.

Download the Survey Now

 

Based on interviews with over 600 professionals, the index confirmed the trend noticed by federal agencies and revealed important insights about why mobile devices present a significant security risk for the public sector. What became clear was that cyber attackers aren’t interested in mobile devices because of the data they hold, they’re interested in them as a gateway to access core business systems. It’s these core systems and applications that hold far more lucrative information, including citizen’s personally identifiable information, national security secrets, and other highly sensitive – and highly valuable – data. As federal government agencies become more reliant on mobile devices to meet the mission, the more opportunities there are for them to be compromised and used as an      access point for a serious breach.

What steps can public sector organizations take to mitigate this risk that don’t involve abandoning mobile device use?

Bryan suggests three steps that all public sector organizations should take:

  • Educate End Users: The Mobile Security Index clearly showed that while agencies were highly confident in their ability to identify a compromised device and respond to an attack. However, with more than one in three agencies being the victims of a mobile device-based attack in the last year, and with only in ten agencies reporting that there highly confident of their employees’ knowledge of mobile security, there’s still work to be done.
  • Establish an Acceptable Use Policy (AUP): An AUP or Mobile Device Management policy, establishes how agency workers can, and can’t, use their mobile devices. Federal agencies, including the Department of Treasury, the National Oceanic and Atmospheric Administration (NOAA), and the National Institutes of Health are among the agencies that have clear use policies covering use of agency-issued devices as well as acceptable use of personal devices.
  • Unify Endpoint Management: Unified Endpoint Management (UEM) empowers the user to overcome the challenges of deploying and managing mobility services through a single portal. Using the portal, features of a mobile device can be enabled, or disabled, as needed. By removing unnecessary functionality, security risks are lowered. The risk of an accidental compromise is also lowered.

In closing our conversation, Bryan     shared a thought-provoking twist on the mobility-security equation, turning it on its head. “Mobility services can provide better security capabilities for government agencies.  Mobility enables agencies to use other factors in granting access to sensitive information; for instance, an agency can use a device’s GPS location, biometric authentication or a second piece of hardware validation.”

Download the Survey Now

Tags: Department of TreasuryEndpoint Managementendpoint securityInternet of ThingsIoT SecurityMobile Device Securitymobile securityMobile Security IndexNIHnoaaSmart City SecurityUEMUnified Endpoint ManagementVeterans Affairs

RELATED POSTS

Turn Insights into Impact: How the Department of Veterans Affairs and USPTO are Transforming the Customer Experience
Customer Experience

Turn Insights into Impact: How the Department of Veterans Affairs and USPTO are Transforming the Customer Experience

October 17, 2022
Internet of Things
5G & Mobility

The Internet of Things (IoT): Podcast Part 4

August 23, 2022
Federal Healthcare: Overcoming Data Challenges Drives Mission Success
Civilian

Federal Healthcare: Overcoming Data Challenges Drives Mission Success

March 11, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9327 shares
    Share 3731 Tweet 2332
  • Fixed Wireless Access: Communications Infrastructure Podcast for the Public Sector

    73 shares
    Share 29 Tweet 18
  • Laid-off Tech Workers Find Unexpected Opportunities with Federal Government Contractors

    11 shares
    Share 4 Tweet 3

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us