Worker mobility has become an essential practice for government agencies. From teleworking on the road to accessing critical data on your smart phone, mobility increases productivity and employee satisfaction. And the trend toward mobility is growing. In fact, the Cisco Visual Networking Index predicts there will be more than 10 billion mobile devices worldwide by 2017. With the increased proliferation of mobile devices comes the need to ensure that appropriate policies and procedures are in place so agencies can take advantage of increased capabilities while still maintaining high levels of security.
By and large, government agencies are doing a good job of balancing the need for mobility with security requirements. However, according to a new study by Mobile Work Exchange, which was commissioned by Cisco, 41 percent of government employees are putting agencies at risk with secure mobility habits. Clearly, there is some room for improvement.
The study used the Secure Mobilometer, an online self-assessment tool, to capture data from end-users and agencies. The tool ranked their mobility habits based on practices of user inputs, password protection, data loss prevention, mobile device policies and security training.
Read More »
Tags: byod, cybersecurity, federal, govtech, hot zone, secure mobility
Rarely a week goes by that we don’t hear of a database compromise that results in confidential data—many times consisting of personally identifiable information (PII)—falling into the hands of those who should not have access to the data. Protection of our PII is becoming increasingly critical as more and more information is collected and stored through the use of Internet-enabled devices.
The following is an excerpt from a recent post by Patrick Finn, Senior Vice President of Cisco’s U.S. Public Sector Organization, that focuses on the threat of data breaches impacting government organizations and provides some guidelines for how these organizations can assess and remediate these threats.
“Cyber crimes, cyber thievery, and cyber warfare have become an everyday reality. In fact, security breaches are so prevalent that, according to a new study from the National Cyber Security Alliance and a private sector firm, 26 percent of Americans have been the victims of a data breach in the past 12 months alone. Not only do breaches reduce citizens’ trust in government to protect their confidential data, they also cost government agencies a significant amount of money. For most CIOs and other government keepers of data, these statistics prompt one immediate question – “Can this happen to us?” Unfortunately, the answer to this question is: yes, it can.”
For more on this topic please visit Patrick Finn’s entire post over on the Cisco Government Blog.
Tags: byod, cybersecurity, data breach, govtech, mobile security, security
A sincere thank you to all of those who are serving or who have served in the US military. We live freely today because you put your life on the line to protect all that we hold dear.
“The Flag does not fly because of the winds that blow it,
The Flag flies because of each Soldier’s last breath blowing past.”
“For those who have fought and died for it,
freedom has a taste that the protected will never know.”
“The true soldier fights not because he hates what is in front of him,
but because he loves what is behind him.”
- G. K. Chesterton
As some of you know, my holiday season begins with the Marine’s Birthday and Veterans Day. The holiday season has always been a time for family and gratitude. I always find it fitting that these two days to honor our heroes are in the same month as Thanksgiving. So it is with tremendous honor and gratitude that I wish our Marines a Happy Birthday and our Veterans, past and present, a Happy Veterans Day. Read More »
Tags: America, govtech, remembrance, servicemen, servicewomen, veterans, veteransday
Cyber Crime: Identifying the Sources of an Everyday Threat
Cyber crimes, cyber thievery, and cyber warfare have become an everyday reality. In fact, security breaches are so prevalent that, according to a new study from the National Cyber Security Alliance and a private sector firm, 26 percent of Americans have been the victims of a data breach in the past 12 months alone. Not only do breaches reduce citizens’ trust in government to protect their confidential data, they also cost government agencies a significant amount of money. For most CIOs and other government keepers of data, these statistics prompt one immediate question – “Can this happen to us?” Unfortunately, the answer to this question is: yes, it can. Read More »
Tags: byod, cyber, cybersecurity, govtech, mobile work exchange, mobility, mobilometer, NCSAM, security
Each year, at the IACP Annual Conference, we celebrate the best in community policing through the IACP and Cisco Community Policing Awards. In Mankato, MN, we are living proof of the impact community policing can have on communities.
When we look at critical incidents and threats to public safety, we see that they transcend race, mental state, gender, ideology and other differentiators. They can happen anywhere and in any size city, and it is our job to prevent, deter, respond and recover from those incidents. Of all these, prevention and deterrence are by far the most imperative as you have saved resources and possibly lives, and then you don’t need the efforts and expense of recovery.
To prevent and deter, a police department, city and other public safety agencies must leverage partnerships and problem-solving techniques to proactively address the conditions that give rise to such incidents and threats. With resources limited by current economic conditions, the force multiplication agencies receive by implementing the community policing philosophy and partnering with citizens is the most effective means of making our communities safer.
Read More »
Tags: Community Policing, govtech, IACP, IACP2013, Public Safety, tapestry project