Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Next
Download to read offline and view in fullscreen.

2

Share

Download to read offline

Feds: You have a BYOD program whether you like it or not

Download to read offline

In an effort to better understand mobile threats in federal systems, Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts sensitive government data at risk.

Related Books

Free with a 30 day trial from Scribd

See all

Feds: You have a BYOD program whether you like it or not

  1. 1. Feds: You have a BYOD program whether you like it or not.
  2. 2. We don’t have a BYOD program.
  3. 3. We don’t have a BYOD program. This statement, referencing mobile device usage in the workplace, will likely sound familiar to federal government employees.
  4. 4. Many agencies believe they aren’t subject to cyber-threats from mobile devices because they don’t currently allow personal mobile devices to access their networks. Download Whitepaper
  5. 5. Ultimately, however, this posture puts the government and its data at risk because federal agencies have a BYOD program whether they like it or not. Download Whitepaper
  6. 6. Need a little convincing? After analyzing federal agencies 20 Download Whitepaper
  7. 7. Need a little convincing? After analyzing federal agencies 20 14,622Lookout discovered Lookout-enabled devices associated with government networks. Download Whitepaper
  8. 8. That means people are connecting their phones to your systems. Download Whitepaper
  9. 9. That means people are connecting their phones to your systems. Those devices, in this example, encountered 1,781 app-based threats such as spyware or trojans. Download Whitepaper
  10. 10. The problem is “Shadow BYOD” Download Whitepaper
  11. 11. Shadow BYOD means unmanaged or unknown mobile devices are accessing a network. The problem is “Shadow BYOD” Download Whitepaper
  12. 12. The problem is “Shadow BYOD” Shadow BYOD means unmanaged or unknown mobile devices are accessing a network. Similar to Shadow IT, Shadow BYOD introduces a risk of sensitive data leakage due to the lack of visibility and control of this access. Download Whitepaper
  13. 13. In an effort to better understand what’s going on here, Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts sensitive government data at risk. Download Whitepaper
  14. 14. The answer is unequivocally yes. In an effort to better understand what’s going on here, Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts sensitive government data at risk. Download Whitepaper
  15. 15. Learn more about mobile threats in federal agencies: Feds: You have a BYOD program whether you like it or not. Download Whitepaper
  • AHMADAL5

    Nov. 30, 2016
  • StephanieHarnn

    Nov. 10, 2016

In an effort to better understand mobile threats in federal systems, Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts sensitive government data at risk.

Views

Total views

4,122

On Slideshare

0

From embeds

0

Number of embeds

210

Actions

Downloads

12

Shares

0

Comments

0

Likes

2

×