Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Feds: You have a BYOD program whether you like it or not

3,373 views

Published on

In an effort to better understand mobile threats in federal systems, Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts sensitive government data at risk.

Published in: Technology
  • Be the first to comment

Feds: You have a BYOD program whether you like it or not

  1. 1. Feds: You have a BYOD program whether you like it or not.
  2. 2. We don’t have a BYOD program.
  3. 3. We don’t have a BYOD program. This statement, referencing mobile device usage in the workplace, will likely sound familiar to federal government employees.
  4. 4. Many agencies believe they aren’t subject to cyber-threats from mobile devices because they don’t currently allow personal mobile devices to access their networks. Download Whitepaper
  5. 5. Ultimately, however, this posture puts the government and its data at risk because federal agencies have a BYOD program whether they like it or not. Download Whitepaper
  6. 6. Need a little convincing? After analyzing federal agencies 20 Download Whitepaper
  7. 7. Need a little convincing? After analyzing federal agencies 20 14,622Lookout discovered Lookout-enabled devices associated with government networks. Download Whitepaper
  8. 8. That means people are connecting their phones to your systems. Download Whitepaper
  9. 9. That means people are connecting their phones to your systems. Those devices, in this example, encountered 1,781 app-based threats such as spyware or trojans. Download Whitepaper
  10. 10. The problem is “Shadow BYOD” Download Whitepaper
  11. 11. Shadow BYOD means unmanaged or unknown mobile devices are accessing a network. The problem is “Shadow BYOD” Download Whitepaper
  12. 12. The problem is “Shadow BYOD” Shadow BYOD means unmanaged or unknown mobile devices are accessing a network. Similar to Shadow IT, Shadow BYOD introduces a risk of sensitive data leakage due to the lack of visibility and control of this access. Download Whitepaper
  13. 13. In an effort to better understand what’s going on here, Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts sensitive government data at risk. Download Whitepaper
  14. 14. The answer is unequivocally yes. In an effort to better understand what’s going on here, Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts sensitive government data at risk. Download Whitepaper
  15. 15. Learn more about mobile threats in federal agencies: Feds: You have a BYOD program whether you like it or not. Download Whitepaper

×