by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : February 2013
The mobile device is a consumer device, and the consumers and the users of those devices will use them as a consumer device while accessing business work as well." -- Rodney Dilts, director of network-based security in AT&T s Chief Security Office Mobile devices are beloved for their convenience, speed and access, but they re also a source of consternation from a security standpoint. Government employees who use their smart phones --- personal or work-issued --- to conduct business could unwittingly put their organization s IT systems at risk for spam, bots, worms, and other malware and spyware. With so many device makers, operating systems and carriers to choose from, find- ing a single solution that can mitigate secu- rity concerns seems unlikely at first blush. But a one-size-fits-all approach is exactly what s needed, said Rodney Dilts, director of network-based security in AT&T s Chief Security Office, during a Dec. 5, 2012, web- cast titled "AT&T Mobile Security: Superior Protection Throughout Your Network." "All devices are potential targets," Dilts said. "You need to have constant, clear solu- tions that are available, that are easy to man- age, and that actually go after the threats and events and things that you want to control." Know your enemy To find the best solution, federal IT man- agers must understand the problem, Dilts said. Users are heterogeneous in terms of their devices, locations, methods of access, carriers and even countries. Mobile infra- structures tend to be highly complex despite being easy to use on the front end. "These things make things very diverse and very unpredictable and hard to come up with a solution that goes across all sce- narios," he said. "We know that devices are being sold at an extremely high rate, and as new features become available, these devices become more available to users and users want these devices to make their daily lives better as well as their work experience." Indeed, 89 percent of business users are accessing critical work data from their personal mobile devices, and 41 percent are doing so without company permission or knowledge, Dilts said. "People are becoming more proficient on the devices, and they re figuring out how to get around certain controls," he said. "This makes it tough to deploy solutions when people can just Google how to get around them." Mobile malware --- such as Trojans that send premium SMS messages and root exploits --- increased 155 percent in 2011, and malware jumped 30 percent in the first three months of 2012, while instances of spyware more than doubled in the first quar- ter of 2012, Dilts said, citing statistics from Juniper Networks. Most mobile malware stems from applications, he added. "We can see [that] if we can get some kind of manageable control and better cod- ing around applications, we could start to decrease this number and decrease some of the events we re starting to see around the mobile landscape," he said. D D D D DI I I I IG G G G GI I I I IT T T T TA A A A AL L L L LD D D D DI I I I IA A A A AL L L L LO O O O OG G G G GU U U U UE E E E E MOBILE SECURITY REQUIRES MORE THAN JUST BAND-AIDS AT&T offers a one-size-fits-all, network-based solution to protect mobile devices from malware LISTEN/LEARN: For a replay of the webcast, go to: fcw.com/mobilesecuritywebcast SPONSORED CONTENT THE SPEAKER: Rodney Dilts, Director of Network-based Security in AT&T s Chief Security Office Highlights from a recent AT&T webcast on advancing mobile capabilities MOBILE SECURITY STATISTICS for work without company permission or knowledge. - enced a security threat because of a personal mobile device. devices introducing malware. Sources: Juniper Networks and IDC
March 15, 2013