Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
A guide to BYOD (bring-your-own-device)
Monday - 2/6/2012, 10:21am EST
By Sean McCalley
Federal News Radio
B.Y.O.D. — short for bring your own device — is coming to government. Instead of connecting via office computer, many agencies' online networks will be available to personal devices like iPhones and Androids.
With the new system comes a variety of cybersecurity issues that require careful strategy. Tim Scannell, editorial director of TechnologyGuide.com, joined The Federal Drive with Tom Temin with a breakdown of the benefits and potential pitfalls of BYOD.
Scannell specifically pointed to how easily mobile devices can be lost, stolen or hacked. Because there is no practical way to supervise mobile computing, a cyber criminal might have a new way to infiltrate an agency.
"Not that Leon Panetta is going to be on Foursquare and he's going to say 'Oh, he's in Syria today!'" Scannell said. "But, it's going to be very serious because companies have no control to see what happens there."
In an earlier report, Andrew Jackson, the Interior Department's deputy assistant secretary for technology, information and business services, said his department's new mobile policy offers a plethora of cost-saving possibilities.
"If we can give them the tools to get their job done more quickly, more efficiently, it's my belief that we'll actually function better as a department and ultimately do our jobs better for the taxpayers," Jackson said.
This change reflects the growing presence of mobile devices in the workplace, including the private sector. Scannell said that 72 percent of private companies have no official strategy to incorporate mobile computing. This is despite the fact that half of mobile devices in the workplace are employee-owned (as of last year).
"They really don't know what to do in terms of these devices, so they sort of have a loosey-goosey policy that doesn't fit into the current mobile strategies," Scannell said.