Filter by Category

Upcoming FISMA Update to Protect Mobile Data

FISMA to improve mobile security

Mobile security has been a frequent topic of discussion in recent months. For those in the public sector, a lack of compliance requirements for mobile devices has sparked several concerns. Is it safe to connect to the cloud with a device that isn’t protected? How many cell phones and tablets are at risk of being compromised by everyday use, like connecting to a vulnerable wireless hotspot or downloading a seemingly harmless application?

FISMA, the Federal Information Security Management Act, requires government agencies to create, document, and implement a plan that ensures the security of their network and information systems. This covers devices like workstations, laptops, and desktops, but it sadly lacks mobile guidelines.

Thankfully, this oversight may soon change. The Department of Homeland Security (DHS) has turned their focus to mobile security, with plans to implement new research programs and update FISMA with new mobile requirements for government workers. In April 2017, they published a Study on Mobile Device Security with consultation from the National Institute of Standards and Technology (NIST). Their top consideration moving forward? Enhance FISMA metrics to focus on mobile device security.

A mobile addition to FISMA compliance couldn’t be more timely. According to this article, “67% of companies included in a recent Ponemon Institute survey have experienced a breach from an employee’s mobile device.” Other shocking statistics, like the hefty, $10,000 pricetag that comes with investigating and repairing just one infected device, capitalize on the very real need for mobile security.

Furthermore, attacks on mobile applications and mobile data, especially those belonging to federal employees, are on the rise. The Business of Federal Technology states in an article on prioritizing mobile security: “Because of the combination of features only available on mobile—connected via Wi-Fi or cell networks with voice, camera, email, location, passwords, contact lists and more—these devices have become an attractive target for cybercriminals and nation-states looking to spy on government agencies, infrastructure providers and others.”

There are steps organizations can take now to prioritize the security of their employees’ mobile devices. Some of these include mandatory use of multi-factor authentication, only allowing use of work-provided devices during normal business hours, limiting what each device can access and download, and requiring frequent OS updates. We also suggest reviewing your current cybersecurity policies in anticipation for FISMA’s mobile security update.

As of the publication of this post, FISMA may roll out requirements for mobile security in 2018.

 

Add a Comment

Allowed tags: <b><i><br>

Latest Posts


Why You Should Never Use FTP to Transfer Cloud Files

March 7, 2019

The cloud has become an increasingly popular topic among organizations in recent years. From sharing projects via cloud collaboration tools to exchanging files between a company and its trading…


Public Defender’s Office Reduces Manual Data Entry with Secure File Transfer Software

March 4, 2019

Every organization has legacy processes. Manual data entry, file cabinets full of paper records, sensitive documents sent across the organization by email, or even file transfers sent via homegrown…


Five Secure File Transfer Alternatives to FTP

February 21, 2019

The Need for Secure File Transfer Protocols Back in the day, File Transfer Protocol (FTP) was the go-to protocol for sending files. It was a simpler time, and security was far less of an issue than…


Which is Better: Free SFTP Software vs. Enterprise-Level SFTP Software?

February 14, 2019

Free SFTP Software vs. Enterprise-Level SFTP Software In general, people like free things. Beverages, company lunches, swag at tradeshows and conferences, t-shirts and socks, those intriguing items…


What is Secure File Transfer?

February 5, 2019

Moving sensitive, often-proprietary files from one person—or organization—to another has become a complex aspect of the business world today. This complexity comes not only from the size…