feds: you have a byod program whether you like it or not
TRANSCRIPT
Feds: You have a BYOD program whether you like it or not.
We don’t have a BYOD program.
We don’t have a BYOD program.
This statement, referencing mobile device usage
in the workplace, will likely sound familiar to federal government employees.
Many agencies believe they aren’t subject to cyber-threats from
mobile devices because they don’t currently allow personal mobile devices to access their networks.
Download Whitepaper
Ultimately, however, this posture puts the government
and its data at risk because federal agencies have a BYOD program whether they like it or not.
Download Whitepaper
Need a little convincing?
After analyzing federal agencies20Download Whitepaper
Need a little convincing?
After analyzing federal agencies2014,622Lookout
discovered
Lookout-enabled devices associated with government networks.
Download Whitepaper
That means people are connecting their phones to your systems.
Download Whitepaper
That means people are connecting their phones to your systems.
Those devices, in this example, encountered 1,781 app-based threats such as spyware or trojans.
Download Whitepaper
The problem is “Shadow BYOD”
Download Whitepaper
Shadow BYOD means unmanaged or unknown mobile devices are accessing a network.
The problem is “Shadow BYOD”
Download Whitepaper
The problem is “Shadow BYOD”
Shadow BYOD means unmanaged or unknown mobile devices are accessing a network.
Similar to Shadow IT, Shadow BYOD introduces a risk of sensitive data leakage due to the lack of visibility and control of this access.
Download Whitepaper
In an effort to better understand what’s going on here, Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and
suss out whether that behavior puts sensitive government data at risk.
Download Whitepaper
The answer is unequivocally yes.
In an effort to better understand what’s going on here, Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and
suss out whether that behavior puts sensitive government data at risk.
Download Whitepaper
Learn more about mobile threats in federal agencies:
Feds: You have a BYOD program whether you like it or not.
Download Whitepaper