Filter by Category

Upcoming FISMA Update to Protect Mobile Data

FISMA to improve mobile security

Mobile security has been a frequent topic of discussion in recent months. For those in the public sector, a lack of compliance requirements for mobile devices has sparked several concerns. Is it safe to connect to the cloud with a device that isn’t protected? How many cell phones and tablets are at risk of being compromised by everyday use, like connecting to a vulnerable wireless hotspot or downloading a seemingly harmless application?

FISMA, the Federal Information Security Management Act, requires government agencies to create, document, and implement a plan that ensures the security of their network and information systems. This covers devices like workstations, laptops, and desktops, but it sadly lacks mobile guidelines.

Thankfully, this oversight may soon change. The Department of Homeland Security (DHS) has turned their focus to mobile security, with plans to implement new research programs and update FISMA with new mobile requirements for government workers. In April 2017, they published a Study on Mobile Device Security with consultation from the National Institute of Standards and Technology (NIST). Their top consideration moving forward? Enhance FISMA metrics to focus on mobile device security.

A mobile addition to FISMA compliance couldn’t be more timely. According to this article, “67% of companies included in a recent Ponemon Institute survey have experienced a breach from an employee’s mobile device.” Other shocking statistics, like the hefty, $10,000 pricetag that comes with investigating and repairing just one infected device, capitalize on the very real need for mobile security.

Furthermore, attacks on mobile applications and mobile data, especially those belonging to federal employees, are on the rise. The Business of Federal Technology states in an article on prioritizing mobile security: “Because of the combination of features only available on mobile—connected via Wi-Fi or cell networks with voice, camera, email, location, passwords, contact lists and more—these devices have become an attractive target for cybercriminals and nation-states looking to spy on government agencies, infrastructure providers and others.”

There are steps organizations can take now to prioritize the security of their employees’ mobile devices. Some of these include mandatory use of multi-factor authentication, only allowing use of work-provided devices during normal business hours, limiting what each device can access and download, and requiring frequent OS updates. We also suggest reviewing your current cybersecurity policies in anticipation for FISMA’s mobile security update.

As of the publication of this post, FISMA may roll out requirements for mobile security in 2018.

 

 

Add a Comment

Allowed tags: <b><i><br>

Latest Posts


What Do Industry Professionals Think of Cloud Security? Get the 2018 Guide

June 18, 2018

Whether you’re considering a public cloud deployment or already exist in some form of hybrid environment, you’re probably trying to keep a pulse on the ever-evolving topic of cloud…


Introducing GoAnywhere MFT 5.7: New Cloud Integrations and Other Features

June 15, 2018

  The latest version of our secure managed file transfer solution is live! Today GoAnywhere MFT 5.7 released with a variety of new features and updates, including brand-new Cloud Connectors,…


20 Managed File Transfer Project Ideas (Plus Survey Results)

June 6, 2018

Earlier this year, HelpSystems surveyed nearly 200 GoAnywhere MFT users to see how they use managed file transfer software in their organizations. The responses we received from our customers were…


Tradeshow Recap: Exploring Cloud File Transfer at Red Hat Summit 2018

May 21, 2018

Last week marked the first year for GoAnywhere as an exhibitor at Red Hat Summit in San Francisco. The three-day conference was a whirlwind of activity, great conversations, and opportunities to…


3 Reasons to Attend VMUG's June 7 Virtual Event

May 17, 2018

Whether you’re already using VMware to manage multiple virtual machines in one console, or you’re just getting started with datacenter virtualization, staying on top of trends, changes,…