Comment

The future is mobile

  

Today’s workforce trends are converging to impact federal IT deployments.

First, government agencies have to prepare for a complex and unprecedented environment of cyber threats. From confidential tax returns to classified intelligence briefings, government agencies regularly handle sensitive information that requires additional safeguards. This means that they have a unique obligation to protect their data against a wave of new cybersecurity threats. Technology innovations like the internet of things, which could impact development of smart buildings, fleet telematics and more, suggest that security will be an even more critical priority in the coming years. 

Second, millennials have become the largest generation in the U.S. workforce and will constitute three out of every four workers by 2025. The first true digital natives, millennials are uniquely comfortable using their mobile devices for both work and leisure. They send emails while taking selfies and update presentations while playing Pokemon Go -- all on one device in the span of a few minutes. When choosing a job, 60 percent of millennials consider whether they will have access to state-of-the art technology.

Millennials are more likely to use wearable devices than any other generation, and they are increasingly using them for business purposes. Park rangers can use wearables to track their exact location while in the field, and refinery inspectors can use wearables to stay connected while investigating a facility. These devices -- like mobile devices writ large – are proving essential to the modern federal workplace.

As a result, government agencies, like all industries, must adopt a mobile-first strategy that goes beyond smartphones and includes wearables.

Over the next few years, it will become critically important for government agencies to adjust to this new reality. During that transition, they will need to recognize the unique rewards and risks that come with a millennial-focused, mobile-first strategy.  

Because millennials are so comfortable with their mobile devices, they tend to be more productive than older generations when using them. A recent study from Frost and Sullivan found that millennials see the greatest productivity gains from using smartphones. In the study, millennials reported gaining an additional hour of productivity each day, and 81 percent claimed that their devices make them more efficient.

But the same comfort that makes millennials more productive also makes them more likely to engage in risky online behavior. According to a Forcepoint study, 70 percent of millennials admit to using unprotected Wi-Fi connections, 32 percent download unauthorized apps, and 42 percent use the same password across all apps. Although these behaviors create potential security risks, what's worse is that many millennials are not concerned about them. One study found that more than a third of all millennials don't worry about digital privacy at all.

So how can government agencies adopt a mobile-first strategy that maximizes the benefits of millennial productivity while minimizing the security risks that millennials may present?

To address this issue, the federal government unveiled its CIO Digital Strategy in 2012. The strategy provided a framework for agencies to collaborate and effectively harness government mobility solutions, a key part of which encouraged agencies to deploy bring-your-own-device programs similar to the ones that have gained traction in the private sector.

But because of the government's unique emphasis on security, BYOD strategies have often failed to address the particular needs of the federal workforce. Most phones in a BYOD program cannot meet the strict compliance and reporting regulations that come with handling highly confidential and classified data. As a result, many agencies remain unsatisfied with BYOD programs and have chosen not to deploy them as a mobile solution.

Instead, agencies have replaced their BYOD programs with a choose-your-own-device mobile strategy. In a CYOD program, agencies generally offer one or two devices per manufacturer and give employees the opportunity to choose the device they prefer. The agency then pays for the device and the plan.  

Agencies are choosing CYOD programs because of the additional security protocols that they can deploy. With these solutions, they have much more control over the hardware and software on a device, meaning that they can tailor a mobile security platform to their particular needs. And they can do so  cost effectively, meaning they won't need to worry about any potential budget hurdles along the way.

While CYOD programs give agencies the critical security infrastructure they need, they also provide the flexibility that millennial employees want. Because the security on these devices is often built into both the hardware and the operating system of the device, users don't have to think about or interact with all of the security elements running in the background. All they see is a familiar interface that provides an intuitive, seamless experience identical to the one found on their personal smartphones. But if a hacker tries to tamper with the device, access can be  immediately blocked to prevent a breach of data. The result is a device that millennials are comfortable using and government agencies can trust.

CYOD strategies can allow millennials to unlock the full potential of their productivity while ensuring that important government data remains locked away from potential cyber threats. As a result, many government agencies are turning to these strategies as a cost-efficient way to recruit and retain millennial talent while updating their cybersecurity infrastructure for a new, complex threat environment. It's an ideal way for government agencies to balance the millennial preference for flexibility and the institutional need for security.

About the Author

Johnny Overcast, Sr. is Director, Government Sales at Samsung Electronics America

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Shutterstock image (by wk1003mike): cloud system fracture.

    Does the IRS have a cloud strategy?

    Congress and watchdog agencies have dinged the IRS for lacking an enterprise cloud strategy seven years after it became the official policy of the U.S. government.

  • Shutterstock image: illuminated connections between devices.

    Who won what in EIS

    The General Services Administration posted detailed data on how the $50 billion Enterprise Infrastructure Solutions contract might be divvied up.

  • Wikimedia Image: U.S. Cyber Command logo.

    Trump elevates CyberCom to combatant command status

    The White House announced a long-planned move to elevate Cyber Command to the status of a full combatant command.

  • Photo credit: John Roman Images / Shutterstock.com

    Verizon plans FirstNet rival

    Verizon says it will carve a dedicated network out of its extensive national 4G LTE network for first responders, in competition with FirstNet.

  • AI concept art

    Can AI tools replace feds?

    The Heritage Foundation is recommending that hundreds of thousands of federal jobs be replaced by automation as part of a larger government reorganization strategy.

  • DOD Common Access Cards

    DOD pushes toward CAC replacement

    Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.

Reader comments

Wed, Feb 22, 2017

CYOD... pfffft! IF (and only IF) a governmental organization decides to provide its employees with "devices" (and most will not and do not), THEN... employees must carry TWO devices (his or her own personal device for personal business, and a government device for government only business)

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group