In an effort to better understand mobile threats in federal systems, Lookout surveyed over 1,000 federal government employees to identify their behaviors on mobile and suss out whether that behavior puts sensitive government data at risk.
3. We don’t have a BYOD program.
This statement, referencing mobile device usage
in the workplace, will likely sound familiar to
federal government employees.
4. Many agencies believe they aren’t subject to cyber-threats from
mobile devices because they don’t currently allow
personal mobile devices to access their networks.
Download Whitepaper
5. Ultimately, however, this posture puts the government
and its data at risk because federal agencies have
a BYOD program whether they like it or not.
Download Whitepaper
6. Need a little convincing?
After analyzing federal agencies
20
Download Whitepaper
7. Need a little convincing?
After analyzing federal agencies
20
14,622Lookout
discovered
Lookout-enabled
devices associated with
government networks.
Download Whitepaper
8. That means people are connecting
their phones to your systems.
Download Whitepaper
9. That means people are connecting
their phones to your systems.
Those devices, in this example, encountered 1,781
app-based threats such as spyware or trojans.
Download Whitepaper
11. Shadow BYOD means unmanaged or unknown
mobile devices are accessing a network.
The problem is “Shadow BYOD”
Download Whitepaper
12. The problem is “Shadow BYOD”
Shadow BYOD means unmanaged or unknown
mobile devices are accessing a network.
Similar to Shadow IT, Shadow BYOD introduces a risk
of sensitive data leakage due to the lack of
visibility and control of this access.
Download Whitepaper
13. In an effort to better understand what’s going on here,
Lookout surveyed over 1,000 federal government
employees to identify their behaviors on mobile and
suss out whether that behavior puts sensitive
government data at risk.
Download Whitepaper
14. The answer is unequivocally yes.
In an effort to better understand what’s going on here,
Lookout surveyed over 1,000 federal government
employees to identify their behaviors on mobile and
suss out whether that behavior puts sensitive
government data at risk.
Download Whitepaper
15. Learn more about mobile threats in federal agencies:
Feds: You have a BYOD program
whether you like it or not.
Download Whitepaper