by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : June 15, 2014
The number and variety of threats to mobile devices and the data they access will never disappear---and in fact, new threats will continue to arise. But with the right tools and planning, most of these threats can be thwarted before they harm an agency, its data or its users. Here are some of the biggest threats to watch out for: Malware and Spyware: According to Juniper's latest Mobile Threat Center research, the number of malware programs threatening mobile users grew by more than 600 percent in 2012 over the previous year. That number covers many types of threats, including: Trojans: Code inserted into applications to the device. Once executed by the user, Trojans can steal data and take over device resources. Worms: These programs, which can lead users to take actions that cause harm, create similar or exact copies of itself that can reproduce itself to other devices. Ransomware: This fairly recent type of malware can either be installed when a user visits a malicious website or when a user opens a malicious email attachment, link or instant message. In its 2014 Predictions Report, McAfee said it expects ransomware to proliferate on mobile devices. Spyware: When installed on a mobile device, spyware can collect data about a user's web browsing history, personal contacts and locations visited and send that data back to the hacker's location. Data leakage: If mobile devices aren't subject to stringent controls, it's not only possible that sensitive data will get into the wrong hands---it's likely. And it's all too common. A Juniper research report on mobile security found that more than 80 percent of enterprise and consumer devices are unprotected and at risk of data leakage. Here are a few examples of how this could happen: email attachment to an external partner over an unsecured WiFi network. cloud, which can be accessed by anyone he invites in. a non work-related app onto the mobile device she uses for work. Data device loss/theft: When employee loses a mobile device, it is costly. Beyond the hardware itself, an organization might need to deal with the lost productivity and the potential danger of data breaches. Unfortunately, devices are often lost. A study from Kensington found that a laptop is stolen every 53 second. And of the 70 million smartphones lost each year, only 7 percent are recovered. That is why agencies need clear policies about---and solutions for---remotely locking devices and wiping them clean of agency data. Mo G m GAME CHANGING ECHNOLOG O MEE AGENC MI ION SPONSORED REPORT SECURE MOBILITY/ MOBILE WORKFORCE Implementing the right policies and software are critical for mobile security, but starting with solidly secure devices is also part of the equation. here is increasingly good news on that front. Even employees using their own smartphones, tablets and laptops are likely to benefit from today's advances in mobile security. Here is a look at some of the most important security advances in today's mobile hardware: Tablets: ablets suitable for government use today should, at minimum, have built-in features for government-grade encryption, password protection and secure VPN connections, and full device and D card encryption. It's often wise to invest in optional fingerprint scanners, available for some tablets. Depending on the manufacturer and model, there are many other security features, such as Microsoft's rusted Boot, ecure Boot and Measure Boot for preventing malware; the rusted Platform Module ( PM), available on Dell tablets, for ensuring integrity; and BitLocker for better hard drive encryption. Smartphones: All of the major smartphone vendors have upped their security game. Many phones today provide advanced MDM features that prevent employees from making changes to their accounts on their phone, disable hotspot settings, activate or deactivate tracking and remote locking. ome phones also provide touch-based biometric authentication, enterprise single sign-on, the ability to activate VPN access per application, and the ability to configure Wi-Fi credentials for specific authentication methods used in the enterprise. Laptops: ecurity features on laptops are fairly mature, yet continue to improve. At the very least, laptops used by government employees should BitLocker encryption, and for more sensitive situations, the highest level of FIP 140-2 protection. Other valuable add-ons include smart card and fingerprint readers, a way to physically lock the laptop to a stationary object, R A ecurID and FIP 140-2-certified PM for secure credential storage. For the highest level of security, consider something like Dell ControlVault, which isolates user passwords and credentials on a separately controlled hardware chip. On the hardware front
June 30, 2014
July 15, 2014