Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Information Technology News
How to secure mobile devices at your agency
Tuesday - 2/19/2013, 9:21pm EST
This year we will see new hardware and operating systems, all in a world of thousands of apps.
No wonder federal information technology professionals are looking for solutions to manage this mess.
One option to consider is using hardware.
Today's interview is with Glenn Schoonover from Koolspan.
They recommend a solution that uses a micro SD card for each device. This card can be encrypted so the operating system cannot be altered.
During the interview Schoonover elucidates upon the variations of using software and passwords for securing mobile devices. Then, he contrasts that with the success of using micro SD cards.
Most security experts have predicted the end of passwords.
Users just have too many to worry about and tend to use the same password that leads to dangerous exploits being run.
There is a current report from NIST which gives guidelines for using hardware authentication for mobile devices.
Nobody has a crystal ball that will show what will replace passwords, it could be something as exotic as voice recognition.
However, it is important for all federal information professionals to listen to options that may fit their specific circumstances.