Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
How to secure mobile devices at your agency
Tuesday - 2/19/2013, 9:21pm EST
This year we will see new hardware and operating systems, all in a world of thousands of apps.
No wonder federal information technology professionals are looking for solutions to manage this mess.
One option to consider is using hardware.
Today's interview is with Glenn Schoonover from Koolspan.
They recommend a solution that uses a micro SD card for each device. This card can be encrypted so the operating system cannot be altered.
During the interview Schoonover elucidates upon the variations of using software and passwords for securing mobile devices. Then, he contrasts that with the success of using micro SD cards.
Most security experts have predicted the end of passwords.
Users just have too many to worry about and tend to use the same password that leads to dangerous exploits being run.
There is a current report from NIST which gives guidelines for using hardware authentication for mobile devices.
Nobody has a crystal ball that will show what will replace passwords, it could be something as exotic as voice recognition.
However, it is important for all federal information professionals to listen to options that may fit their specific circumstances.