by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : March 15, 2016
24 March 15, 2016 FCW.COM ExecTe c h nation with mobile device management technology that enables IT managers to remotely wipe the device’s data if it is lost or stolen and allows them to carve out sepa- rate areas on the device for work and personal activities. According to Gartner, the top MDM vendors are VMware’s AirWatch, MobileIron, Citrix, IBM’s MaaS360 (recently rebranded as MobileFirst Protect) and Good Technology, which was acquired by BlackBerry late last year. Chris Christou, a senior associate at Booz Allen Ham- ilton who focuses on cloud and mobility, said he’s seeing increased government interest in mobile devices that sup- port the separation between work and personal uses. In addition to making life easier for employees, that approach allows personal data to stay private while giving the govern- ment control over work-related apps and communications. “I really see it going in that direction,” he said, adding that his company has been helping agencies adopt mobile device management and develop mobile content strategies. Regardless of the approach taken to device deploy- ment, agencies need to incorporate security that’s easy for employees to use. For example, employees who use smartphones, tablets and laptops in public locations should be logging into critical systems via virtual private networks. “VPN technology has been available for a long time,” said Kunal Rupani, principal product manager at Accel- lion, which works with NASA and other agencies to secure content and collaboration tools. “But try to imagine con- figuring that VPN and signing in every single time.” Inconvenient technology can drive employees to use consumer-friendly alternatives such as free online email and document-sharing platforms such as Dropbox, which puts them out of range of agencies’ security oversight. Key obstacles facing agencies Many agencies have formal policies prohibiting the use of personal devices for work. But according to the Lookout survey, 40 percent of federal employees say the rules have no impact on their behavior. And training only goes so far. According to the Lookout survey, 58 percent of respondents report being aware of the security consequences of using their personal mobile phones for work, yet 85 percent of them will still use their phone for potentially risky activities. Furthermore, 48 percent say they know they’re not allowed to store work-related files on their personal devices, but 30 per- cent do it anyway. “Users are the weakest link,” said Michael Robinson, a computer forensics professor at George Mason University and former CIO at DOD’s Business Transformation Agency. “They don’t like security where it provides any amount of friction to the work that they do,” he added. “Fifty per- cent don’t want to use a password on their phone because it’s too hard. Ten to 20 percent will click on an unsafe phishing link. It’s just a disaster waiting to happen.” Breaking the rules Federal employees are customizing their devices by jailbreaking or rooting — which is great for the security-savvy, but leaves operating systems open to unpatched vulnerabilities 40% of employees at agencies with rules prohibiting personal smartphone use at work say the rules have little to no impact on their behavior An overview of employees who have rooted/ jailbroken devices they use for work 65% have access to work email on their compromised device 57% have access to work documents on their compromised device 9% Age 35 or younger 16% Using government- issued devices 22% Regularly connect to federal Wi-Fi 25 20 15 10 5 0 031516fcw_022-025.indd 24 2/23/16 11:39 AM
March 30, 2016