One of the fundamental things standing in the way of broader adoption of user-owned devices by federal agencies, usually referred to as BYOD, is fear, uncertainty, and doubt.
Despite the delightful onomatopoeia, neither fear, nor uncertainty, or doubt should be holding up the implementation of a strategy that has near-universal recognition for cost savings, improving employee productivity, and improving customer service. But security, especially when dealing with the business of state, is a legitimate concern and does deserve some careful consideration.
Recently Nate Rushfinn took a look at how two factor authentication, a tried and true security strategy, could enable government agencies to embrace BYOD and start to realize the benefits that come with a more flexible technology environment. For Rushfinn, the solution seems to lie not in Common Access Cards, but in the smart phone. He suggests taking a look at how Google, Microsoft, and Twitter have improved their security via two factor authentication in recent months following high profile breaches and combine this with a closer look at authentication software and apps.
It’s an interesting idea and perhaps one that when combined with remote device wiping capabilities would provide a sufficiently robust layered defense to calm the fears of any federal agency CIO.
You can read Rushfinn’s entire post over at Nate’s Blog, by clicking here.