Between FISMA, Continuous Monitoring, HSPD-12, et al – Feds are adopting a belt-and-suspenders approach to security. And, if that wasn’t enough, Snowden’s taught the Prez about DLP.
But, there’s no point in locking the door and leaving the windows wide open – right? A new study from the Mobile Work Exchange, MeriTalk’s sister organization, shows Uncle Sam’s mobility Achilles’ heel. This study is based on data Feds input into the Secure Mobilometer.
I’ll try to keep this short so you can read this on those unsecured iPhones and droids – you know the ones you keep in your other pocket…
Let me be clear, these security issues don’t apply to Blackberrys – or for that matter, papyrus scrolls.
So, here’s the skinny on Feds’ mobile security from the study:
- 57 percent of government agencies failed the mobile security test
- Only 25 percent have received mobile security training – Digital Government Strategy eat your heart out
- Only 50 percent have proper mobile device management programs at their agencies
- 25 percent don’t use passwords
- 33 percent of those with passwords admit they’re easy to crack – 1234 anybody?
- Six percent write down their password – post-it note on the back?
- 31 percent of Feds use public WiFi
- 52 percent don’t use data encryption or multifactor authentication
And, before you jump on the Fed bashing bandwagon, please note, Feds did better than their private-sector counterparts who took the test.