FCWInsider

Blog archive

BYOD: Bring Your Own Disaster?

hammer

The government's tool for re-securing a compromised iPhone.

Q: What's the government process for wiping an iPhone after a security leak?

A: Pound it with a hammer.

Managing mobile devices and their risks, instituting security measures on par with more traditional desktops and laptops, determining what tool to use when things go wrong – these are all commonly cited hurdles to BYOD in federal agencies. But there are so many others that accompany those concerns that it sometimes becomes difficult to imagine it's actually going to happen.

Of course, it's happening already, on a certain level. There are pilot programs. There are options, such as bolting $200 Common Access Card "sleds" onto the device for authentication purposes so Defense Department employees can take their smart phones to work.

But neither of those is the true BYOD policy that personnel in the digital era want: the freedom to use one familiar device to do it all, work and personal, without worries about "leakage" or having all your vacation photos smashed into oblivion.

"If you look at it from a financial standpoint, sure, it's the cost of the device," said Maj. Linus Barloon, chief of cyber operations division in the J3 directorate and cyberspace officer in the Air Force's White House Communications Agency. "But when you look at the man-hours associated with cleaning up a spill for a regular device, and now toss in a smart device – it's just easier to stay away from bring-your-own-device, issue the user one of your own devices such that you can [install] the governmental controls."

It is not just the devices, either. The data itself and the policies that govern BYOD present just as much, if not more, of a problem, officials said July 24 at MeriTalk's cybersecurity brainstorm event in Washington. The discussion there represented a snapshot of a conversation that is playing out across agencies and departments.

"There are more implications to BYOD than to cybersecurity," said Joe Johnson, managed mobility program manager at the General Services Administration. "Some of that has to do with legal, some of that has to do with employee unions – who pays for the devices, are they getting reimbursed? What are the legal implications of data that could be lost? It's a Pandora's box that I don't think anybody has really figured out yet. It's probably easier to think of BYOD from a security policy point of view than it is with the broader policy implications that extend beyond security policy itself."

Posted by Amber Corrin on Jul 26, 2013 at 1:28 PM


FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.

Featured

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

  • Shutterstock image.

    Merged IT modernization bill punts on funding

    A House panel approved a new IT modernization bill that appears poised to pass, but key funding questions are left for appropriators.

  • General Frost

    Army wants cyber capability everywhere

    The Army's cyber director said cyber, electronic warfare and information operations must be integrated into warfighters' doctrine and training.

  • Rising Star 2013

    Meet the 2016 Rising Stars

    FCW honors 30 early-career leaders in federal IT.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group