Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Federal Government Facing Mobile Security Challenges

A report from Telework Exchange, sponsored by EMC, VMware, Cisco, and Carahsoft, shows that Federal employees are taking advantage of the BYOD bandwagon, but at the cost of higher risk to their respective agencies.

A report from Telework Exchange, sponsored by EMC, VMware, Cisco, and Carahsoft, shows that Federal employees are taking advantage of the BYOD bandwagon, but at the cost of higher risk to their respective agencies.

In their 2013 Digital Dilemma Report, Telework Exchange says that more than half of the smartphone users in the Federal government use their personal smartphone for job-related tasks. Yet, one in three workers do not have password protection. While mobile devices create a great opportunity for productivity gains, the report says, agencies must address current behaviors to ensure government data is not in danger.

Mobile Device Security“We can all agree employees are mobile. It is our responsibility to ensure access to government data is secure,” said Cindy Auten, general manager of Telework Exchange.

In addition to password protection issues, another note from the study shows that 85 percent of the Federal employees included have downloaded an app to their personal smartphone or tablet, which exposes the device, its data, and the user to a greater level of risk, depending on the nature of the application. According to a recent GAO report, malware attacks directed at mobile devices increased by 185 percent in less than a year.

Other items from the report include the fact that just 11% of the agencies represented have some sort of BYOD policy in place, despite the fact that 55% of the employees surveyed use their own personal devices for work. Moreover, only 27% of the mobile devices being used have access to multi-factor authentication and secure remote connections to the employee’s agency.

“IT transformation, helped by the adoption of mobile computing, is at an all time high within the Federal government,” said Kyle Keller, federal cloud business director at EMC Corporation.

“As more Federal employees introduce their own smartphones, tablets, and other mobile devices to work, managing these devices over an IT infrastructure they can trust becomes crucial. Implementation of policy, training and technology will be necessary to ensure the best security and control in this new era of increased mobility.”

The full report is available here

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.