Feds: You have a BYOD program whether you like it or not
19 Aug 2015•0 j'aime
2 j'aime
Soyez le premier à aimer ceci
afficher plus
•4,295 vues
vues
Nombre de vues
0
Sur Slideshare
0
À partir des intégrations
0
Nombre d'intégrations
0
Télécharger pour lire hors ligne
Signaler
Technologie
In an effort to better understand mobile threats in federal systems, Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts sensitive government data at risk.
We don’t have a BYOD program.
This statement, referencing mobile device usage
in the workplace, will likely sound familiar to
federal government employees.
Many agencies believe they aren’t subject to cyber-threats from
mobile devices because they don’t currently allow
personal mobile devices to access their networks.
Download Whitepaper
Ultimately, however, this posture puts the government
and its data at risk because federal agencies have
a BYOD program whether they like it or not.
Download Whitepaper
Need a little convincing?
After analyzing federal agencies
20
Download Whitepaper
Need a little convincing?
After analyzing federal agencies
20
14,622Lookout
discovered
Lookout-enabled
devices associated with
government networks.
Download Whitepaper
That means people are connecting
their phones to your systems.
Download Whitepaper
That means people are connecting
their phones to your systems.
Those devices, in this example, encountered 1,781
app-based threats such as spyware or trojans.
Download Whitepaper
Shadow BYOD means unmanaged or unknown
mobile devices are accessing a network.
The problem is “Shadow BYOD”
Download Whitepaper
The problem is “Shadow BYOD”
Shadow BYOD means unmanaged or unknown
mobile devices are accessing a network.
Similar to Shadow IT, Shadow BYOD introduces a risk
of sensitive data leakage due to the lack of
visibility and control of this access.
Download Whitepaper
In an effort to better understand what’s going on here,
Lookout surveyed over 1,000 federal government
employees to identify their behaviors on mobile and
suss out whether that behavior puts sensitive
government data at risk.
Download Whitepaper
The answer is unequivocally yes.
In an effort to better understand what’s going on here,
Lookout surveyed over 1,000 federal government
employees to identify their behaviors on mobile and
suss out whether that behavior puts sensitive
government data at risk.
Download Whitepaper
Learn more about mobile threats in federal agencies:
Feds: You have a BYOD program
whether you like it or not.
Download Whitepaper